skip to main content
10.1145/1558607.1558633acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Detecting overflow vulnerabilities using automated verification

Published:13 April 2009Publication History

ABSTRACT

Maintaining the security of our computer systems has become one of the dominant aspects of the war on terror and many researchers and developers predict that the next attack against the United States will be a computer attack [5, 9, 11]. The Department of Homeland Security has established a partnership with industry, the United States Computer Readiness Team (US-CERT), to protect the nation's Internet infrastructure [2]. The US-CERT sponsors an automated, web-based repository of standards based vulnerability data (NVD), which includes a database of security related software flaws [3].

References

  1. Isabelle/HOL: a proof assistant for higher-order logic. Springer-Verlag, UK, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. The National Strategy to Secure Cyberspace. February 2003.Google ScholarGoogle Scholar
  3. The National Vulnerability Database. December 2008.Google ScholarGoogle Scholar
  4. N. Cooprider, W. Archer, E. Eide, D. Gay, and J. Regehr. Efficient memory safety for tinyos. In SenSys '07: Proceedings of the 5th international conference on Embedded networked sensor systems, pages 205--218, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. E. Denning. Is cyber terror next?, November 2001.Google ScholarGoogle Scholar
  6. E. Haugh and M. Bishop. Testing c programs for buffer overflow vulnerabilities. In Network and Distributed System Security Symposium (NDSS, 2003.Google ScholarGoogle Scholar
  7. G. Helmer. Incomplete list of Unix vulnerabilities.Google ScholarGoogle Scholar
  8. M. Sitaraman, D. P. Gandi, W. Küchlin, C. Sinz, and B. B. Weide. DEET for component-based software. In Proceedings of the 2004 SAVCBS Workshop, ACM SIGSOFT 2004/FSE-12, pages 95--104, Newport Beach, CA, Oct. 2004.Google ScholarGoogle Scholar
  9. A. C. Trembly. The next terrorist attack: Coming soon to a computer screen near you? October 2001.Google ScholarGoogle Scholar
  10. D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, pages 3--17, San Diego, CA, February 2000.Google ScholarGoogle Scholar
  11. C. Wilson. Computer attack and cyber terrorism: Vulnerabilities and policy issues for congress. 2003.Google ScholarGoogle Scholar

Index Terms

  1. Detecting overflow vulnerabilities using automated verification

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Other conferences
                    CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
                    April 2009
                    952 pages
                    ISBN:9781605585185
                    DOI:10.1145/1558607

                    Copyright © 2009 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 13 April 2009

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article
                  • Article Metrics

                    • Downloads (Last 12 months)5
                    • Downloads (Last 6 weeks)0

                    Other Metrics

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader