scholarly journals How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool

2019 ◽  
Vol 45 (9) ◽  
pp. 877-897 ◽  
Author(s):  
Justin Smith ◽  
Brittany Johnson ◽  
Emerson Murphy-Hill ◽  
Bill Chu ◽  
Heather Richter Lipford
2017 ◽  
Vol 43 (4) ◽  
pp. 268-276 ◽  
Author(s):  
V. K. Koshelev ◽  
V. N. Ignatiev ◽  
A. I. Borzilov ◽  
A. A. Belevantsev

Author(s):  
Nitesh B. Guinde ◽  
Xin Tang ◽  
Ronak Sutaria ◽  
Sotirios G. Ziavras ◽  
Constantine N. Manikopoulos

2012 ◽  
Vol 44 (5) ◽  
pp. 537-563
Author(s):  
Makarand Gawade ◽  
K. Ravikanth ◽  
Sanjeev Aggarwal

Author(s):  
Aamir Shahab ◽  
Muhammad Nadeem ◽  
Mamdouh Alenezi ◽  
Raja Asif

Buffer overflows are one of the most common software vulnerabilities that occur when more data is inserted into a buffer than it can hold. Various manual and automated techniques for detecting and fixing specific types of buffer overflow vulnerability have been proposed, but the solution to fix Unicode buffer overflow has not been proposed yet. Public security vulnerability repository e.g., Common Weakness Enumeration (CWE) holds useful articles about software security vulnerabilities. Mitigation strategies listed in CWE may be useful for fixing the specified software security vulnerabilities. This research contributes by developing a prototype that automatically fixes different types of buffer overflows by using the strategies suggested in CWE articles and existing research. A static analysis tool has been used to evaluate the performance of the developed prototype tools. The results suggest that the proposed approach can automatically fix buffer overflows without inducing errors.


Sign in / Sign up

Export Citation Format

Share Document