Registros
documentos

 

Materias (1562,988):

textos901docs (1579,102): electrical engineering computer science

sqlexec


criterio: (id='2143453')


gis.where: content. gis.searchtype: instr. gis.page: 1. gis.count: 1

ejecutor: d

gis.verb: GetRecord / content

*******************************************************

sss: SELECT id AS RegistroID, reemplazos AS MReemplazos, categ as VALERIO, marc AS Content, iduri AS uri, resumen AS rtags, sortby AS ordenado FROM negun WHERE ((id='2143453')) LIMIT 0,1;

Keywords (GIS/901a) 2204,102: Electrical Engineering and Computer Science.

estante.sql: select * from dddddddddddddddd where simple in ('massachusetts institute technology');
estante.a110: Massachusetts Institute of Technology
estante.sqlx: 'massachusetts institute technology'
estantea.1: massachusetts institute technology
Entidad:
ENTIDAD (Massachusetts Institute of Technology): Massachusetts Institute of Technology
IPHS (2266,113): oai:dspace.mit.edu:1721.1/18025

Securing software : an evaluation of static source code analyzers

Thesis (M

Publicidad

iii.script.c

Contenidos

Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.

Includes bibliographical references (leaves 100-105).

This thesis evaluated five static analysis tools--Polyspace C Verifier, ARCHER, BOON, Splint, and UNO--using 14 code examples that illustrated actual buffer overflow vulnerabilities found in various versions of Sendmail, BIND, and WU-FTPD. Each code example included a "BAD" case with one or more buffer overflow vulnerabilities and a "PATCHED" case without buffer overflows. The buffer overflows varied and included stack, heap, bss and data buffers; access above and below buffer bounds; access using pointers, indices, and functions; and scope differences between buffer creation and use. Detection rates for the "BAD" examples were low except for Splint and PolySpace C Verifier, which had average detection rates of 57% and 87% respectively. However, average false alarm rates, as measured using the "PATCHED" programs, were high for these two systems. The frequency of false alarms per lines of code was high for both of these tools; Splint gave on average one false alarm per 50 lines of code, and PolySpace gave on average one false alarm per 10 lines of code. This result shows that current approaches can detect buffer overflows, but that false alarm rates need to be lowered substantially.

by Misha Zitser.

M.Eng.

securing software : an evaluation of static source code analyzers (Equipo)

Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science.
Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science.

Vínculo

57225430

securing software : an evaluation of static source code analyzers (Responsables)

Richard Lippmann.

Keywords (901a / 2266,113)

Keywords

Electrical Engineering and Computer Science.

Vincular (851 / 2266,113)

Publicidad

AAAAAAAAAAAA
tabla AAAAAAAAAAAA AAAAAAAAAAAA
    184.72.160.105  2375