[22656] in bugtraq

home help back first fref pref prev next nref lref last post

Statically Detecting Likely Buffer Overflow Vulnerabilities

daemon@ATHENA.MIT.EDU (aleph1@securityfocus.com)
Sun Sep 16 20:15:19 2001

Date: Sat, 15 Sep 2001 16:41:18 -0600
From: aleph1@securityfocus.com
To: secpapers@securityfocus.com
Cc: bugtraq@securityfocus.com
Message-ID: <20010915164118.Z1818@securityfocus.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Statically Detecting Likely Buffer Overflow Vulnerabilities
David Larochelle and David Evans.

Buffer overflow attacks may be today's single most important security 
threat. This paper presents a new approach to mitigating buffer overflow 
vulnerabilities by detecting likely vulnerabilities through an analysis of 
the program source code. Our approach exploits information provided in 
semantic comments and uses lightweight and efficient static analyses. This 
paper describes an implementation of our approach that extends the LCLint 
annotation-assisted static checking tool. Our tool is as fast as a compiler 
and nearly as easy to use. We present experience using our approach to 
detect buffer overflow vulnerabilities in two security-sensitive programs.

http://www.cs.virginia.edu/~evans/usenix01-abstract.html
http://lclint.cs.virginia.edu/usenix01.pdf
http://lclint.cs.virginia.edu/usenix01.html

-- 
Elias Levy
SecurityFocus
http://www.securityfocus.com/
Si vis pacem, para bellum

home help back first fref pref prev next nref lref last post