We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as an integer range analysis problem. One major advantage of static analysis is that security bugs can be eliminated before code is deployed. We have implemented our design and used our prototype to find
new remotely-exploitable vulnerabilities in a large, widely deployed software package. An earlier hand audit missed these bugs
more here...........http://cpl0.net/~argp/papers/24dcd918253f6a44a43ac6612294397f.pdf
new remotely-exploitable vulnerabilities in a large, widely deployed software package. An earlier hand audit missed these bugs
more here...........http://cpl0.net/~argp/papers/24dcd918253f6a44a43ac6612294397f.pdf