2011
DOI: 10.1007/978-3-642-22306-8_3
|View full text |Cite
|
Sign up to set email alerts
|

String Abstractions for String Verification

Abstract: Abstract. Verifying string manipulating programs is a crucial problem in computer security. String operations are used extensively within web applications to manipulate user input, and their erroneous use is the most common cause of security vulnerabilities in web applications. Unfortunately, verifying string manipulating programs is an undecidable problem in general and any approximate string analysis technique has an inherent tension between efficiency and precision. In this paper we present a set of sound a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…There is a large body of work on statically detecting security vulnerabilities in programs. Many of these techniques focus on detecting cross-site scripting (XSS) or code injection vulnerabilities [8,11,12,15,17,19,20,23,27,28,29,31,32,33,34]. There has also been recent work on static detection of specific classes of denial-of-service vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…There is a large body of work on statically detecting security vulnerabilities in programs. Many of these techniques focus on detecting cross-site scripting (XSS) or code injection vulnerabilities [8,11,12,15,17,19,20,23,27,28,29,31,32,33,34]. There has also been recent work on static detection of specific classes of denial-of-service vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…The information tracked by this analysis is fixed, and it is specific for PHP programs. However, in 2011, they proposed a unifying framework of their previous works, that is, an abstraction lattice, which can be tuned to provide various trade‐offs between precision and performance. The framework is based on the regular abstraction , a relational analysis in which values of string variables are represented as multitrack DFA (each track corresponds to a specific string variable).…”
Section: Related Workmentioning
confidence: 99%
“…These investigations have the capability of uncovering vulnerabilities, a large portion of them [9], [10], [11], [12], [13], [14], [15], [16] can't solidly reason about the string and non-string parts of an application and numerous need way affectability, though RCE assaults oblige fulfilling interesting way conditions, including both strings and non-strings. As of late, scientists have proposed methods that can display both strings and non-strings in dynamic typical execution of web applications [17], [18] [19].…”
Section: Introductionmentioning
confidence: 99%