What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability
Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the extensive body of research, BO is still a threat menacing security-critical applications. The authors present a comprehensive systematic review on techniques intended to detecting BO vulnerabilities before...
Saved in:
| Published in: | International journal of systems and software security and protection Vol. 9; no. 3; pp. 1 - 33 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Hershey
IGI Global
01.07.2018
|
| Subjects: | |
| ISSN: | 2640-4265, 2640-4273 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the extensive body of research, BO is still a threat menacing security-critical applications. The authors present a comprehensive systematic review on techniques intended to detecting BO vulnerabilities before releasing a software to production. They found that most of the studies addresses several vulnerabilities or memory errors, being not specific to BO detection. The authors organized them in seven categories: program analysis, testing, computational intelligence, symbolic execution, models, and code inspection. Program analysis, testing and code inspection techniques are available for use by the practitioner. However, program analysis adoption is hindered by the high number of false alarms; testing is broadly used but in ad hoc manner; and code inspection can be used in practice provided it is added as a task of the software development process. New techniques combining object code analysis with techniques from different categories seem a promising research avenue towards practical BO detection. |
|---|---|
| AbstractList | Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the extensive body of research, BO is still a threat menacing security-critical applications. The authors present a comprehensive systematic review on techniques intended to detecting BO vulnerabilities before releasing a software to production. They found that most of the studies addresses several vulnerabilities or memory errors, being not specific to BO detection. The authors organized them in seven categories: program analysis, testing, computational intelligence, symbolic execution, models, and code inspection. Program analysis, testing and code inspection techniques are available for use by the practitioner. However, program analysis adoption is hindered by the high number of false alarms; testing is broadly used but in ad hoc manner; and code inspection can be used in practice provided it is added as a task of the software development process. New techniques combining object code analysis with techniques from different categories seem a promising research avenue towards practical BO detection. |
| Author | Chaim, Marcos Lordello Cruzes, Daniela Soares Santos, Daniel Soares |
| AuthorAffiliation | School of Arts, Sciences and Humanities, University of Sao Paulo, Sao Paulo, Brazil Institute of Mathematical Sciences and Computing, University of Sao Paulo, São Carlos, Brazil Department of Software Engineering, Safety & Security, SINTEF Digital, Trondheim, Norway |
| AuthorAffiliation_xml | – name: Institute of Mathematical Sciences and Computing, University of Sao Paulo, São Carlos, Brazil – name: School of Arts, Sciences and Humanities, University of Sao Paulo, Sao Paulo, Brazil – name: Department of Software Engineering, Safety & Security, SINTEF Digital, Trondheim, Norway |
| Author_xml | – sequence: 1 givenname: Daniela surname: Cruzes middlename: Soares fullname: Cruzes, Daniela Soares organization: Department of Software Engineering, Safety & Security, SINTEF Digital, Trondheim, Norway – sequence: 2 givenname: Marcos surname: Chaim middlename: Lordello fullname: Chaim, Marcos Lordello organization: School of Arts, Sciences and Humanities, University of Sao Paulo, Sao Paulo, Brazil – sequence: 3 givenname: Daniel surname: Santos middlename: Soares fullname: Santos, Daniel Soares organization: Institute of Mathematical Sciences and Computing, University of Sao Paulo, São Carlos, Brazil |
| BookMark | eNp9kUtLAzEUhYMo-PwB7gKuXFTzmqTjRqr1LShU7TKkMzcaGZOaySj9904dUfC1yiV8J_fknFW06IMHhDYp2RGE9nfPzkej0fUOa2eiCCV0Aa0wKUhPMMUXP2eZLaONun4khDCaEcXVCnoaP5iEhwGPAV_48IoHk9AkfNBYCxFfvUC0VXs7hARFcsHv7-EBHjXxBWY4eHwDxYN3zw3UOIUPqgWuIdauTuATvmsqD9FMXOXSbB0tWVPVsPFxrqHb46Obw9Pe5dXJ2eHgsle0xvIen5CSEqVEWfRNyTLgUhYZl6UAYcu-KQyjJc2YFXKihFGS8z63kglJjeFW8TW01b07jWFuLunH0ETfrtQsJ4LxXNC8pVRHFTHUdQSrC5fM_JcpGldpSvQ8Xt3Fq7_ibZX0m3Ia3ZOJs381253G3bsvOz84PS1tyx7_wg6DHoOet6TfW9JdS3_vzPkbzseiUg |
| CitedBy_id | crossref_primary_10_1016_j_cose_2021_102536 crossref_primary_10_1007_s10664_022_10179_6 |
| Cites_doi | 10.1016/j.infsof.2009.10.004 10.1109/ACSAC.2000.898880 10.1109/CISP-BMEI.2016.7853039 10.1145/360248.360252 10.1109/SERE-C.2012.35 10.1109/ISSREW.2014.26 10.1007/3-540-47764-0_12 10.1109/SECPRI.2002.1004369 10.1007/978-3-642-15497-3_5 10.1109/TSE.2016.2615307 10.1145/1449955.1449791 10.1002/spe.515 10.1145/1013886.1007528 10.1145/1542476.1542504 10.1109/ICETC.2010.5529688 10.1109/CSAC.2003.1254327 10.1109/ICIS.2009.158 10.1145/2652524.2652533 10.1109/ICST.2016.21 10.1016/j.compeleceng.2012.07.005 10.1145/1134285.1134319 10.1134/S0361768815060055 10.1049/iet-sen.2015.0039 10.1145/940071.940114 10.1007/978-3-662-03811-6 10.1145/2001420.2001459 10.1109/NSWCTC.2009.10 10.1109/EC2ND.2010.14 10.1145/781131.781149 10.1016/j.cor.2007.01.013 10.1007/978-3-642-23702-7_11 10.1109/ICSM.2008.4658084 10.1109/CompComm.2015.7387532 10.1145/2187671.2187679 10.1109/ICSE.2013.6606613 10.1145/2737095.2737097 10.1109/PRDC.2015.10 10.1109/TSE.1984.5010248 10.1109/SP.2014.44 10.1049/iet-sen.2014.0185 10.1007/BFb0055853 10.1145/1985793.1985960 10.1145/1985793.1985995 10.1109/C-M.1978.218136 10.1145/948109.948155 10.1145/1390630.1390636 10.1109/52.976940 10.3233/JCS-2011-0434 10.1145/1882291.1882338 10.1145/1982185.1982493 10.1109/COMPSAC.2015.78 10.1007/11572329_5 10.1109/SECPRI.1998.674827 10.1007/978-3-540-74810-6_4 10.1145/2993717.2993724 10.1145/1453101.1453137 |
| ContentType | Journal Article |
| Copyright | Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. |
| Copyright_xml | – notice: Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. |
| DBID | AAYXX CITATION 7SC 8FD 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V L7M L~C L~D M7S P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.4018/IJSSSP.2018070101 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central ProQuest Technology Collection ProQuest One ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Engineering Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2640-4273 |
| EndPage | 33 |
| ExternalDocumentID | 10_4018_IJSSSP_2018070101 Do_We_Know_About_Buffer_10_4018_IJSSSP_20180701019 |
| GroupedDBID | ADEKF ALMA_UNASSIGNED_HOLDINGS EBS EJD JRD AAYVP AAYXX ABGRR ABJCF ACOJC AFFHD AFKRA ARAPS BENPR BGLVJ CCPQU CITATION CTSEY H13 HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS 7SC 8FD 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V L7M L~C L~D P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c2159-3b0d10774dc8ad25e366c536d4e4fd8aca21d152f46b74a763383f62461aa3f73 |
| IEDL.DBID | M7S |
| ISSN | 2640-4265 |
| IngestDate | Sun Jul 13 05:17:19 EDT 2025 Sat Nov 29 04:27:13 EST 2025 Tue Nov 18 21:49:25 EST 2025 Tue Jan 05 23:29:49 EST 2021 Thu May 09 18:54:04 EDT 2019 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2159-3b0d10774dc8ad25e366c536d4e4fd8aca21d152f46b74a763383f62461aa3f73 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7157-5141 |
| PQID | 2904239419 |
| PQPubID | 2045816 |
| PageCount | 33 |
| ParticipantIDs | crossref_primary_10_4018_IJSSSP_2018070101 igi_journals_Do_We_Know_About_Buffer_10_4018_IJSSSP_20180701019 crossref_citationtrail_10_4018_IJSSSP_2018070101 proquest_journals_2904239419 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-07-01T00:00:00 |
| PublicationDateYYYYMMDD | 2018-07-01 |
| PublicationDate_xml | – month: 07 year: 2018 text: 2018-07-01T00:00:00 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Hershey |
| PublicationPlace_xml | – name: Hershey |
| PublicationTitle | International journal of systems and software security and protection |
| PublicationYear | 2018 |
| Publisher | IGI Global |
| Publisher_xml | – name: IGI Global |
| References | IJSSSP.2018070101-67 D.Jackson (IJSSSP.2018070101-38) 2000 IJSSSP.2018070101-62 J.Wilander (IJSSSP.2018070101-87) 2003 IJSSSP.2018070101-60 IJSSSP.2018070101-65 M.Harman (IJSSSP.2018070101-32) 2010 N.Gupta (IJSSSP.2018070101-30) 2005 IJSSSP.2018070101-63 IJSSSP.2018070101-64 IJSSSP.2018070101-59 H.Shahriar (IJSSSP.2018070101-74) 2008 A.Zeller (IJSSSP.2018070101-95) 2009 IJSSSP.2018070101-56 IJSSSP.2018070101-57 IJSSSP.2018070101-7 IJSSSP.2018070101-8 IJSSSP.2018070101-50 IJSSSP.2018070101-51 IJSSSP.2018070101-1 IJSSSP.2018070101-54 IJSSSP.2018070101-4 IJSSSP.2018070101-55 IJSSSP.2018070101-5 IJSSSP.2018070101-52 IJSSSP.2018070101-53 IJSSSP.2018070101-47 A. V.Aho (IJSSSP.2018070101-0) 2007 IJSSSP.2018070101-48 IJSSSP.2018070101-46 A.Shaw (IJSSSP.2018070101-76) 2014 B. M.Padmanabhuni (IJSSSP.2018070101-66) 2015 IJSSSP.2018070101-40 IJSSSP.2018070101-43 IJSSSP.2018070101-44 IJSSSP.2018070101-41 IJSSSP.2018070101-42 E.Larson (IJSSSP.2018070101-45) 2003 IJSSSP.2018070101-37 IJSSSP.2018070101-35 G.Novark (IJSSSP.2018070101-61) 2007 R.Sebesta (IJSSSP.2018070101-73) 2012 IJSSSP.2018070101-39 T. E.Hart (IJSSSP.2018070101-33) 2008 IJSSSP.2018070101-31 IJSSSP.2018070101-25 IJSSSP.2018070101-26 IJSSSP.2018070101-23 IJSSSP.2018070101-29 B.-H.Li (IJSSSP.2018070101-49) 2011 IJSSSP.2018070101-28 P.Muntean (IJSSSP.2018070101-58) 2015; 9337 S.Chen (IJSSSP.2018070101-9) 2003 IJSSSP.2018070101-21 IJSSSP.2018070101-22 IJSSSP.2018070101-20 M.Weber (IJSSSP.2018070101-84) 2001 IJSSSP.2018070101-14 C. S.Horstmann (IJSSSP.2018070101-36) 2005 IJSSSP.2018070101-12 IJSSSP.2018070101-13 E.Haugh (IJSSSP.2018070101-34) 2003 IJSSSP.2018070101-18 IJSSSP.2018070101-19 IJSSSP.2018070101-16 IJSSSP.2018070101-17 IJSSSP.2018070101-90 IJSSSP.2018070101-91 D.Pozza (IJSSSP.2018070101-68) 2008 IJSSSP.2018070101-94 IJSSSP.2018070101-92 IJSSSP.2018070101-93 IJSSSP.2018070101-10 IJSSSP.2018070101-11 IJSSSP.2018070101-96 IJSSSP.2018070101-97 B.Ding (IJSSSP.2018070101-15) 2012 S.Rawat (IJSSSP.2018070101-71) 2012 IJSSSP.2018070101-89 S.Bilin (IJSSSP.2018070101-2) 2016 D.Pozza (IJSSSP.2018070101-69) 2006 H.Shahriar (IJSSSP.2018070101-75) 2011 IJSSSP.2018070101-80 H.Chen (IJSSSP.2018070101-6) 2004 IJSSSP.2018070101-81 M.Vujosevic-Janicic (IJSSSP.2018070101-82) 2008 J.Foster (IJSSSP.2018070101-24) 2018 IJSSSP.2018070101-88 IJSSSP.2018070101-85 IJSSSP.2018070101-86 IJSSSP.2018070101-78 IJSSSP.2018070101-79 D.Wagner (IJSSSP.2018070101-83) 2000 IJSSSP.2018070101-72 F.Gao (IJSSSP.2018070101-27) 2016 IJSSSP.2018070101-70 D.Binkley (IJSSSP.2018070101-3) 2007 IJSSSP.2018070101-77 |
| References_xml | – ident: IJSSSP.2018070101-41 doi: 10.1016/j.infsof.2009.10.004 – ident: IJSSSP.2018070101-81 doi: 10.1109/ACSAC.2000.898880 – start-page: 851 year: 2008 ident: IJSSSP.2018070101-68 article-title: A Lightweight Security Analyzer inside GCC. publication-title: International Conference on Availability, Reliability and Security (ARES) – year: 2005 ident: IJSSSP.2018070101-36 publication-title: Core Java 2 – ident: IJSSSP.2018070101-44 – start-page: 3 year: 2000 ident: IJSSSP.2018070101-83 article-title: A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. publication-title: Proc. Network and Distributed Systems Security Conference – ident: IJSSSP.2018070101-54 doi: 10.1109/CISP-BMEI.2016.7853039 – ident: IJSSSP.2018070101-42 doi: 10.1145/360248.360252 – ident: IJSSSP.2018070101-7 doi: 10.1109/SERE-C.2012.35 – ident: IJSSSP.2018070101-64 doi: 10.1109/ISSREW.2014.26 – ident: IJSSSP.2018070101-16 doi: 10.1007/3-540-47764-0_12 – ident: IJSSSP.2018070101-11 doi: 10.1109/SECPRI.2002.1004369 – ident: IJSSSP.2018070101-96 doi: 10.1007/978-3-642-15497-3_5 – year: 2003 ident: IJSSSP.2018070101-87 publication-title: A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. Network and Distributed System Security (NDSS) – ident: IJSSSP.2018070101-72 doi: 10.1109/TSE.2016.2615307 – ident: IJSSSP.2018070101-23 doi: 10.1145/1449955.1449791 – ident: IJSSSP.2018070101-12 – year: 2003 ident: IJSSSP.2018070101-45 article-title: High Coverage Detection of Input-Related Security Faults. publication-title: USENIX Security Symposium – ident: IJSSSP.2018070101-48 doi: 10.1002/spe.515 – start-page: 133 year: 2000 ident: IJSSSP.2018070101-38 article-title: Software Analysis: A Roadmap. publication-title: International Conference on Software Engineering – ident: IJSSSP.2018070101-80 doi: 10.1145/1013886.1007528 – ident: IJSSSP.2018070101-59 doi: 10.1145/1542476.1542504 – ident: IJSSSP.2018070101-1 doi: 10.1109/ICETC.2010.5529688 – start-page: 1 year: 2006 ident: IJSSSP.2018070101-69 publication-title: Comparing lexical analysis tools for buffer overflow detection in network software. In Communication Systems Software and Middleware (COMSWARE) – ident: IJSSSP.2018070101-78 doi: 10.1109/CSAC.2003.1254327 – ident: IJSSSP.2018070101-10 doi: 10.1109/ICIS.2009.158 – ident: IJSSSP.2018070101-22 doi: 10.1145/2652524.2652533 – start-page: 137 year: 2011 ident: IJSSSP.2018070101-75 publication-title: A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor. In Dependable, Autonomic and Secure Computing (DASC) – start-page: 3 year: 2001 ident: IJSSSP.2018070101-84 publication-title: A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. In Source Code Analysis and Manipulation (SCAM) – ident: IJSSSP.2018070101-93 doi: 10.1109/ICST.2016.21 – ident: IJSSSP.2018070101-8 doi: 10.1016/j.compeleceng.2012.07.005 – ident: IJSSSP.2018070101-62 – ident: IJSSSP.2018070101-31 doi: 10.1145/1134285.1134319 – start-page: 177 year: 2012 ident: IJSSSP.2018070101-71 publication-title: Finding Buffer Overflow Inducing Loops in Binary Executables. In Software Security and Reliability (SERE) – ident: IJSSSP.2018070101-63 doi: 10.1134/S0361768815060055 – start-page: 387 year: 2008 ident: IJSSSP.2018070101-33 article-title: Augmenting Counterexample-Guided Abstraction Refinement with Proof Templates. – ident: IJSSSP.2018070101-57 doi: 10.1049/iet-sen.2015.0039 – start-page: 786 year: 2016 ident: IJSSSP.2018070101-27 article-title: BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities. – ident: IJSSSP.2018070101-52 doi: 10.1145/940071.940114 – year: 2007 ident: IJSSSP.2018070101-0 publication-title: Compilers: Principles, Techniques, and Tools – ident: IJSSSP.2018070101-60 doi: 10.1007/978-3-662-03811-6 – ident: IJSSSP.2018070101-47 doi: 10.1145/2001420.2001459 – year: 2012 ident: IJSSSP.2018070101-73 publication-title: Concepts of Programming Languages – ident: IJSSSP.2018070101-51 doi: 10.1109/NSWCTC.2009.10 – ident: IJSSSP.2018070101-70 doi: 10.1109/EC2ND.2010.14 – start-page: 263 year: 2005 ident: IJSSSP.2018070101-30 article-title: Locating faulty code using failure-inducing chops. – ident: IJSSSP.2018070101-17 doi: 10.1145/781131.781149 – ident: IJSSSP.2018070101-29 doi: 10.1016/j.cor.2007.01.013 – ident: IJSSSP.2018070101-53 doi: 10.1007/978-3-642-23702-7_11 – start-page: 29 year: 2008 ident: IJSSSP.2018070101-82 article-title: Ensuring Safe Usage of Buffers in Programming Language C. publication-title: International Conference on Software Technologies (ICSOFT) – start-page: 7 year: 2010 ident: IJSSSP.2018070101-32 publication-title: Why Source Code Analysis and Manipulation Will Always be Important. In Source Code Analysis and Manipulation (SCAM) – ident: IJSSSP.2018070101-39 doi: 10.1109/ICSM.2008.4658084 – ident: IJSSSP.2018070101-92 doi: 10.1109/CompComm.2015.7387532 – start-page: 104 year: 2007 ident: IJSSSP.2018070101-3 publication-title: Source Code Analysis: A Road Map. In Future of Software Engineering (FOSE) – year: 2004 ident: IJSSSP.2018070101-6 article-title: Model Checking One Million Lines of C Code. publication-title: Network and Distributed System Security Symposium (NDSS) – ident: IJSSSP.2018070101-94 doi: 10.1145/2187671.2187679 – year: 2018 ident: IJSSSP.2018070101-24 – ident: IJSSSP.2018070101-40 doi: 10.1109/ICSE.2013.6606613 – ident: IJSSSP.2018070101-79 doi: 10.1145/2737095.2737097 – ident: IJSSSP.2018070101-56 doi: 10.1109/PRDC.2015.10 – ident: IJSSSP.2018070101-85 doi: 10.1109/TSE.1984.5010248 – start-page: 979 year: 2008 ident: IJSSSP.2018070101-74 article-title: Mutation-Based Testing of Buffer Overflow Vulnerabilities. publication-title: Computer Software and Applications Conference (COMPSAC) – ident: IJSSSP.2018070101-91 doi: 10.1109/SP.2014.44 – ident: IJSSSP.2018070101-67 doi: 10.1049/iet-sen.2014.0185 – ident: IJSSSP.2018070101-4 doi: 10.1007/BFb0055853 – start-page: 165 year: 2011 ident: IJSSSP.2018070101-49 publication-title: RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. In Secure Software Integration and Reliability Improvement (SSIRI) – ident: IJSSSP.2018070101-89 doi: 10.1145/1985793.1985960 – ident: IJSSSP.2018070101-43 – start-page: 124 year: 2014 ident: IJSSSP.2018070101-76 publication-title: Automatically Fixing C Buffer Overflows Using Program Transformations. In Dependable Systems and Networks (DSN) – ident: IJSSSP.2018070101-86 – ident: IJSSSP.2018070101-5 doi: 10.1145/1985793.1985995 – ident: IJSSSP.2018070101-37 – ident: IJSSSP.2018070101-14 doi: 10.1109/C-M.1978.218136 – ident: IJSSSP.2018070101-25 doi: 10.1145/948109.948155 – ident: IJSSSP.2018070101-90 doi: 10.1145/1390630.1390636 – volume: 9337 start-page: 441 year: 2015 ident: IJSSSP.2018070101-58 article-title: Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT. Computer Safety, Reliability, & publication-title: Security – ident: IJSSSP.2018070101-21 doi: 10.1109/52.976940 – ident: IJSSSP.2018070101-97 doi: 10.3233/JCS-2011-0434 – ident: IJSSSP.2018070101-50 doi: 10.1145/1882291.1882338 – ident: IJSSSP.2018070101-88 doi: 10.1145/1982185.1982493 – start-page: 151 year: 2016 ident: IJSSSP.2018070101-2 article-title: A static comprehensive analytical method for buffer overflow vulnerability detection. publication-title: International Conference on Computer Science and Electronic Technology (CSET) ( – ident: IJSSSP.2018070101-65 doi: 10.1109/COMPSAC.2015.78 – ident: IJSSSP.2018070101-13 – ident: IJSSSP.2018070101-55 – year: 2003 ident: IJSSSP.2018070101-34 publication-title: Testing C Programs for Buffer Overflow Vulnerabilities. Network and Distributed System Security (NDSS) – ident: IJSSSP.2018070101-19 doi: 10.1007/11572329_5 – ident: IJSSSP.2018070101-28 doi: 10.1109/SECPRI.1998.674827 – ident: IJSSSP.2018070101-20 doi: 10.1007/978-3-540-74810-6_4 – start-page: 195 year: 2012 ident: IJSSSP.2018070101-15 publication-title: Baggy Bounds with Accurate Checking – start-page: 48 year: 2015 ident: IJSSSP.2018070101-66 publication-title: Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities. In ICSE: Automation of Software Test (AST) – start-page: 605 year: 2003 ident: IJSSSP.2018070101-9 publication-title: A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. In Dependable Systems and Networks (DSN) – year: 2009 ident: IJSSSP.2018070101-95 publication-title: Why Programs Fail - A Guide to Systematic Debugging – ident: IJSSSP.2018070101-35 – start-page: 1 year: 2007 ident: IJSSSP.2018070101-61 publication-title: Exterminator: automatically correcting memory errors with high probability. In Programming Language Design and Implementation (PLDI) – ident: IJSSSP.2018070101-18 – ident: IJSSSP.2018070101-26 doi: 10.1145/2993717.2993724 – ident: IJSSSP.2018070101-46 doi: 10.1145/1453101.1453137 – ident: IJSSSP.2018070101-77 |
| SSID | ssj0002150737 |
| Score | 2.0315034 |
| Snippet | Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the extensive body of research, BO is still a threat menacing... |
| SourceID | proquest crossref igi |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Buffers False alarms Inspection Program verification (computers) Security Software development |
| Title | What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability |
| URI | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJSSSP.2018070101 https://www.proquest.com/docview/2904239419 |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2640-4273 dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0002150737 issn: 2640-4265 databaseCode: K7- dateStart: 20180101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 2640-4273 dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0002150737 issn: 2640-4265 databaseCode: M7S dateStart: 20180101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2640-4273 dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0002150737 issn: 2640-4265 databaseCode: BENPR dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dT9swED-tsIe9wD61AqusaU-TLJrYcRJeKlhB-1JXLQx4sxLbmSqVpLQpEv_9fI5DNaHxstfkYkV35_uwT78fwIckN7ZsNxEVScko10wgkXtEYz3kuuCcGwe7ePE9nkySq6t06g_cVn6ssouJLlDrWuEZ-WGY4gRHyoN0tLihyBqFt6ueQqMH24iSELjRvez-jCXEasfBZtq0P6Q2GUXtxaZtKpLDL1-zLJvidFdi_T7wtDBdaurNfs8exGeXdM52__d3n8OOLzfJcesfL-CJqV7CbkflQPzOfgXXCOFNxjW5NASZsAleBzXkZI30KeSH9fdybp-OTeNGt6rRETkm2Xp5a-5IXZHzDgl2RZraS1kBHK9HN6oacrGeI761G8W9ew2_zk7PP32mnomBKqvDlLJiqG2fGHOtklyHkWFCqIgJzQ0vdZKrPAy0rQRKLoqY5zZm2ca3FIhVl-esjNkb2KrqyrwFEkZlrGzTxYQSPDBJkdsCVRf2IQsU02Efhp0RpPIw5ciWMZe2XUG7ydZucmO3Pny8_2TRYnQ8JjyylpV-p67kuJaXRqJmpdOsbDX77wXSPrz_a4UHEnKhyz4cdH6xkdw4xd7jr_fhGS7XjgUfwFazXJt38FTdNrPVcgDbJ6eT6c8B9L7FdOBc_g8gNQHG |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bb9MwFD7aBhJ7YVy1wgALwQuStSZ2bkhTNSjTSkuZ1LLtzSS2gyqVpLTpUP_UfiPn5LIKTextD7wmJ5Zif-dmH58P4E0YWwzbrcf9MBVcGuETkbvHA9OWJpFS2rLt4ukgGA7D8_PoZAMum7swVFbZ2MTSUJtc0x75vhtRBUcknagz-8WJNYpOVxsKjQoWfbv6jSnb4qDXxfV967pHn8Yfj3nNKsA1ureIi6RtMOcJpNFhbFzPCt_XnvCNtDI1Yaxj1zHo1VLpJ4GMUf8wiUt96rsWxyINBI67CXekCAPSq37Ar_Z0XIquyjadGGa0OTo_rzpIxSQm3O99Ho1GJ1RNFqKeOTUNTeMKNyc_Jtf8Qenkjnb-t-l5APfrcJodVvh_CBs2ewQ7DVUFqy3XY_hJLcpZN2dnlhHTN6PjroJ9WBI9DPuK-pxO8WnXFmVpWtZ5zw7ZaDm_sCuWZ2zcdLpdsCKvpVCArg-QmmQFO11OqX93WWq8egLfbuWnn8JWlmd2F5jrpYHGpFL42peODZMYA3CT4EPhaGHcFrSbRVe6bsNObCBThekY4URVOFFrnLTg3dUns6oHyU3CHUSSqi3RQnVzdWYVzawqZ1ZVM_vvAaIWvP5rhGsSambSFuw1OFxLrkH47ObXr-De8fjLQA16w_5z2KahqxLoPdgq5kv7Au7qi2KymL8sFYzB99uG7B9N4VpG |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=What+Do+We+Know+About+Buffer+Overflow+Detection%3F%3A+A+Survey+on+Techniques+to+Detect+A+Persistent+Vulnerability&rft.jtitle=International+journal+of+systems+and+software+security+and+protection&rft.au=Cruzes%2C+Daniela+Soares&rft.au=Chaim%2C+Marcos+Lordello&rft.au=Santos%2C+Daniel+Soares&rft.date=2018-07-01&rft.issn=2640-4265&rft.eissn=2640-4273&rft.volume=9&rft.issue=3&rft.spage=1&rft.epage=33&rft_id=info:doi/10.4018%2FIJSSSP.2018070101&rft.externalDocID=Do_We_Know_About_Buffer_10_4018_IJSSSP_20180701019 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2640-4265&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2640-4265&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2640-4265&client=summon |