Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2013.12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Towards Practical Reactive Security Audit Using Extended Static Checkers

Published: 19 May 2013 Publication History

Abstract

This paper describes our experience of performing reactive security audit of known security vulnerabilities in core operating system and browser COM components, using an extended static checker HAVOCLITE. We describe the extensions made to the tool to be applicable on such large C++ components, along with our experience of using an extended static checker in the large. We argue that the use of such checkers as a configurable static analysis in the hands of security auditors can be an effective tool for finding variations of known vulnerabilities. The effort has led to finding and fixing around 70 previously unknown security vulnerabilities in over 10 millions lines operating system and browser code.

Cited By

View all
  • (2024)Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data AugmentationProceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems10.1145/3652032.3657564(166-177)Online publication date: 20-Jun-2024
  • (2024)Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal SpecificationsProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657032(105-116)Online publication date: 24-Jun-2024
  • (2024)Detecting security vulnerabilities with vulnerability netsJournal of Systems and Software10.1016/j.jss.2023.111902208:COnline publication date: 1-Feb-2024
  • Show More Cited By

Index Terms

  1. Towards Practical Reactive Security Audit Using Extended Static Checkers
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SP '13: Proceedings of the 2013 IEEE Symposium on Security and Privacy
    May 2013
    571 pages
    ISBN:9780769549774

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 19 May 2013

    Author Tags

    1. extended static checking
    2. program verification
    3. security audit
    4. static analysis

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data AugmentationProceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems10.1145/3652032.3657564(166-177)Online publication date: 20-Jun-2024
    • (2024)Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal SpecificationsProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657032(105-116)Online publication date: 24-Jun-2024
    • (2024)Detecting security vulnerabilities with vulnerability netsJournal of Systems and Software10.1016/j.jss.2023.111902208:COnline publication date: 1-Feb-2024
    • (2021)Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug SymptomsProceedings of the 2021 ACM Asia Conference on Computer and Communications Security10.1145/3433210.3453115(731-743)Online publication date: 24-May-2021
    • (2020)MVPProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489278(1165-1182)Online publication date: 12-Aug-2020
    • (2019)LeopardProceedings of the 41st International Conference on Software Engineering10.1109/ICSE.2019.00024(60-71)Online publication date: 25-May-2019
    • (2018)Verifying Relative Safety, Accuracy, and Termination for Program ApproximationsJournal of Automated Reasoning10.1007/s10817-017-9421-960:1(23-42)Online publication date: 1-Jan-2018
    • (2016)Verifying Relative Safety, Accuracy, and Termination for Program ApproximationsProceedings of the 8th International Symposium on NASA Formal Methods - Volume 969010.1007/978-3-319-40648-0_19(237-254)Online publication date: 7-Jun-2016
    • (2015)Getting to know you: towards a capability model for JavaProceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering10.1145/2786805.2786829(758-769)Online publication date: 30-Aug-2015

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media