2018 IEEE SmartWorld, Ubiquitous Intelligence &Amp; Computing, Advanced &Amp; Trusted Computing, Scalable Computing &Amp; Commu 2018
DOI: 10.1109/smartworld.2018.00218
|View full text |Cite
|
Sign up to set email alerts
|

A New Detection Method for Stack Overflow Vulnerability Based on Component Binary Code for Third-Party Component

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…We used the data in Table II for testing, and the experiment distinguished fragile code from nonfragile code. In contrast to Coyote [11], we can detect problems such as unreleased arrays and pointers that are out of bounds; in contrast to ELAID [17] and SBOD [10], which target only buffer overflow vulnerabilities, we can detect vulnerabilities such as the use of undefined variables.…”
Section: Resultsmentioning
confidence: 96%
See 1 more Smart Citation
“…We used the data in Table II for testing, and the experiment distinguished fragile code from nonfragile code. In contrast to Coyote [11], we can detect problems such as unreleased arrays and pointers that are out of bounds; in contrast to ELAID [17] and SBOD [10], which target only buffer overflow vulnerabilities, we can detect vulnerabilities such as the use of undefined variables.…”
Section: Resultsmentioning
confidence: 96%
“…This paper mainly discusses AST, CFG and DFA techniques under static analysis. Xie et al [10] did not use ASTs, a Correspondence to: Yongjun Li. E-mail: lyj@nwpu.edu.cn School of Computer, Northwestern Polytechnical University, Xi'an, Shaanxi 710072, China CFGs, or DFA but relied only on a scan of the code to identify the buffer declaration and size to identify buffer overflow without paying attention to other vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Stack-based buffer overflow vulnerability detection technique was proposed in binary codes [11]. Different buffers were scanned to find out the risk functions.…”
Section: Introductionmentioning
confidence: 99%