Proceedings of the 18th Annual International Conference on Mobile Computing and Networking 2012
DOI: 10.1145/2348543.2348593
|View full text |Cite
|
Sign up to set email alerts
|

A unified approach to identifying and healing vulnerabilities in x86 machine code

Abstract: The security of software systems is threatened by a wide range of attack vectors, such as buffer overflows, insecure information flow, and side channels, which can leak private information, e.g., by monitoring a program's execution time. Even if programmers manage to avoid such vulnerabilities in a program's source code or bytecode, new vulnerabilities can arise as compilers generate machine code from those representations.We propose a virtual execution environment for x86 machine code that combines informatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…There has been development of static source analysis technique for vulnerability detection in C based on the combination of taint analysis and value range propagation technique used for compiler optimization [1]. There have been work specific to cross 86 platform for virtual execution environment that combines information from compositional, static, and dynamic program analysis to identify vulnerabilities and timing channels, and uses code transformations to prevent those from being exploited [2]. RICH (Run time integer Checker) for detection of integer based attacks in C [3].…”
Section: Early Developments To the Problemmentioning
confidence: 99%
“…There has been development of static source analysis technique for vulnerability detection in C based on the combination of taint analysis and value range propagation technique used for compiler optimization [1]. There have been work specific to cross 86 platform for virtual execution environment that combines information from compositional, static, and dynamic program analysis to identify vulnerabilities and timing channels, and uses code transformations to prevent those from being exploited [2]. RICH (Run time integer Checker) for detection of integer based attacks in C [3].…”
Section: Early Developments To the Problemmentioning
confidence: 99%