2022
DOI: 10.1007/978-3-031-09484-2_6
|View full text |Cite
|
Sign up to set email alerts
|

VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Much like general program analysis using IRs, vulnerability analysis experiments using IRs are limited to a small number of application and feasibility studies (Liang et al, 2016;Cassez et al, 2017;Fornaia et al, 2019;Schilling et al, 2022). While each study discovered relates directly to the problem in question, all outcomes thus far are limited to the detection of, at most, three types of software bugs.…”
Section: Ir In Static Vulnerability Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Much like general program analysis using IRs, vulnerability analysis experiments using IRs are limited to a small number of application and feasibility studies (Liang et al, 2016;Cassez et al, 2017;Fornaia et al, 2019;Schilling et al, 2022). While each study discovered relates directly to the problem in question, all outcomes thus far are limited to the detection of, at most, three types of software bugs.…”
Section: Ir In Static Vulnerability Analysismentioning
confidence: 99%
“…According to Schilling et al (2022), custom built static vulnerability analysis tools are expensive, time-consuming, and inefficient. Many man-hours are required to develop, code, and maintain functionality for very limited, very specific applications.…”
Section: Vandalir: Ir-based Vulnerability Analysesmentioning
confidence: 99%