Authors
Eric Dean Haugh, Matt Bishop
Publication date
2002/9
Institution
University of California, Davis
Description
Security vulnerabilities often result from buffer overflows. A testing technique that instruments programs with code that keeps track of memory buffers, and checks arguments to functions to determine if they satisfy certain conditions, warns when a buffer overflow may occur. It does so when executed with” normal” test data as opposed to test data designed to trigger buffer overflows. A tool using this method was developed and evaluated by testing three widely used, open source software packages. This evaluation shows that the tool is useful for finding buffer overflow flaws, that it has a low false positive rate, and compares well with other techniques.
Total citations
200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024131112231412813146795947135451