scholarly journals Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing

Author(s):  
Maria Christakis ◽  
Patrice Godefroid
Keyword(s):  
Author(s):  
Xiaohua Yin ◽  
Zhiqiu Huang ◽  
Shuanglong Kan ◽  
Guohua Shen ◽  
Zhe Chen ◽  
...  

2021 ◽  
Author(s):  
Hsu-Kang Dow ◽  
Tuo Li ◽  
William Miles ◽  
Sri Parameswaran
Keyword(s):  

2005 ◽  
Vol 4 (1) ◽  
pp. 73-111 ◽  
Author(s):  
Dinakar Dhurjati ◽  
Sumant Kowshik ◽  
Vikram Adve ◽  
Chris Lattner

Author(s):  
Michael Lescisin ◽  
Qusay H. Mahmoud

This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.


2019 ◽  
Vol 43 (4) ◽  
pp. 56-56
Author(s):  
Joseph Jones ◽  
James Wasson ◽  
Sean Brown ◽  
Seth Poulsen ◽  
Peter Aldous ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document