Search method for format string vulnerabilities
In this paper search method for format string vulnerabilities is presented. The method is based on dynamic analysis and symbolic execution. It is applied to program binaries, without requiring debug information. We present a tool implementing this method. We have used this tool to detect known vulne...
Main Authors: | I. A. Vakhrushev, V. V. Kaushan, V. A. Padaryan, A. N. Fedotov |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/596 |
Similar Items
-
Automated exploit generation method for stack buffer overflow vulnerabilities
by: V. A. Padaryan, et al.
Published: (2018-10-01) -
Memory violation detection method in binary code
by: V. V. Kaushan, et al.
Published: (2018-10-01) -
Software defect severity estimation in presence of modern defense mechanisms
by: A. N. Fedotov, et al.
Published: (2018-10-01) -
Buffer overrun detection method in binary code
by: V. V. Kaushan
Published: (2018-10-01) -
Method for exploitability estimation of program bugs
by: A. N. Fedotov
Published: (2018-10-01)