2017
DOI: 10.48550/arxiv.1710.03720
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Practical Integer Overflow Prevention

Paul Muntean,
Jens Grossklags,
Claudia Eckert

Abstract: Integer overflows in commodity software are a main source for software bugs, which can result in exploitable memory corruption vulnerabilities and may eventually contribute to powerful software based exploits, i.e., code reuse attacks (CRAs). In this paper, we present INTGUARD, a symbolic execution based tool that can repair integer overflows with high-quality source code repairs. Specifically, given the source code of a program, INTGUARD first discovers the location of an integer overflow error by using stati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 18 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?