2019
DOI: 10.1007/978-3-030-29962-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Static Detection of Uninitialized Stack Variables in Binary Code

Abstract: More than two decades after the first stack smashing attacks, memory corruption vulnerabilities utilizing stack anomalies are still prevalent and play an important role in practice. Among such vulnerabilities, uninitialized variables play an exceptional role due to their unpleasant property of unpredictability: as compilers are tailored to operate fast, costly interprocedural analysis procedures are not used in practice to detect such vulnerabilities. As a result, complex relationships that expose uninitialize… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…Garmany et al [14] proposed a static analysis framework to find uninitialized variables in binary executables. Their prototype implementation is capable of detecting uninitialized memory errors in complex binaries such as web browsers and OS kernels, and we detected seven novel bugs.…”
Section: Related Workmentioning
confidence: 99%
“…Garmany et al [14] proposed a static analysis framework to find uninitialized variables in binary executables. Their prototype implementation is capable of detecting uninitialized memory errors in complex binaries such as web browsers and OS kernels, and we detected seven novel bugs.…”
Section: Related Workmentioning
confidence: 99%