[18] U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. De-
tecting format string vulnerabilities with type qualifiers.
In Proceedings of the 10th USENIX Security Symposium,
2001.
[19] J. Shapiro, J. Smith, and D. Farber. EROS: a fast capability
system. In Proceedings of the 17th ACM Symposium on
Operating Systems Principles, 1999.
[20] J. Viega, J. T. Bloch, T. Kohno, and G. McGraw. Its4: A
static vulnerability scanner for c and c++ code. In Pro-
ceedings of the 16th Annual Computer Security Applica-
tions Conference, December 2000.
[21] D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step
towards automated detection of buffer overrun vulnerabil-
ities. In Proceedings of NDSS 2000, 2000.
[22] J. Yun, T. Kremenek, Y. Xie, and D. Engler. Meca: an
extensible, expressive system and language for statically
checking security properties. In V. Atluri and P. Liu,
editors, Proceedings of the 10th ACM Conference on
Computer and Communication Security, pages 321–334,
Washington, DC, October 2003. ACM.
[23] X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for
static analysis of authorization hook placement. In Pro-
ceedings of the Eleventh Usenix Security Symposium, Au-
gust 2002.
Komentáře k této Příručce