Building security predicates for some types of vulnerabilities

Approaches for code execution using program vulnerabilities are considered in this paper. Particularly, ways of code execution using buffer overflow on stack and on heap, using use-after-free vulnerabilities and format string vulnerabilities are examined in section 2. Methods for automatic generatio...

Full description

Bibliographic Details
Main Authors: A. N. Fedotov, V. V. Kaushan, S. S. Gaissaryan, Sh. F. Kurmangaleev
Format: Article
Language:English
Published: Ivannikov Institute for System Programming of the Russian Academy of Sciences 2018-10-01
Series:Труды Института системного программирования РАН
Subjects:
Online Access:https://ispranproceedings.elpub.ru/jour/article/view/423