[22656] in bugtraq
Statically Detecting Likely Buffer Overflow Vulnerabilities
daemon@ATHENA.MIT.EDU (aleph1@securityfocus.com)
Sun Sep 16 20:15:19 2001
Date: Sat, 15 Sep 2001 16:41:18 -0600
From: aleph1@securityfocus.com
To: secpapers@securityfocus.com
Cc: bugtraq@securityfocus.com
Message-ID: <20010915164118.Z1818@securityfocus.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Statically Detecting Likely Buffer Overflow Vulnerabilities
David Larochelle and David Evans.
Buffer overflow attacks may be today's single most important security
threat. This paper presents a new approach to mitigating buffer overflow
vulnerabilities by detecting likely vulnerabilities through an analysis of
the program source code. Our approach exploits information provided in
semantic comments and uses lightweight and efficient static analyses. This
paper describes an implementation of our approach that extends the LCLint
annotation-assisted static checking tool. Our tool is as fast as a compiler
and nearly as easy to use. We present experience using our approach to
detect buffer overflow vulnerabilities in two security-sensitive programs.
http://www.cs.virginia.edu/~evans/usenix01-abstract.html
http://lclint.cs.virginia.edu/usenix01.pdf
http://lclint.cs.virginia.edu/usenix01.html
--
Elias Levy
SecurityFocus
http://www.securityfocus.com/
Si vis pacem, para bellum