• SwordDTA

  • Referenced in 1 article [sw17035]
  • dynamic taint analysis tool for software vulnerability detection. Software vulnerabilities are the root cause ... technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint ... hardware. It can be used to detect software vulnerabilities with vulnerability modeling and taint check ... capable of detecting at least four kinds of software vulnerabilities including buffer overflow, integer overflow...
  • MulVAL

  • Referenced in 8 articles [sw17743]
  • Analyzer. To determine the security impact software vulnerabilities have on a particular network, one must ... interactions among multiple network elements. For a vulnerability analysis tool to be useful in practice ... must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second ... users. The tool detected a policy violation caused by software vulnerabilities and the system administrators...
  • CSSV

  • Referenced in 20 articles [sw13701]
  • detecting all buffer overflows in C. Erroneous string manipulations are a major source of software ... defects in C programs yielding vulnerabilities which are exploited by software viruses. We present...
  • VulDeePecker

  • Referenced in 1 article [sw36365]
  • Learning-Based System for Vulnerability Detection. The automatic detection of software vulnerabilities is an important ... study of using deep learning-based vulnerability detection to relieve human experts from the tedious ... learning to vulnerability detection. In particular, we need to find representations of software programs that ... software products (namely Xen, Seamonkey, and Libav) and detect 4 vulnerabilities, which are not reported...
  • LIFT

  • Referenced in 3 articles [sw20596]
  • System for Detecting Security Attacks. Computer security is severely threatened by software vulnerabilities. Prior work ... taint analysis) is a promising technique to detect a wide range of security attacks. However ... overheads. This paper proposes a low overhead, software-only information flow tracking system, called LIFT...
  • Taintscope

  • Referenced in 0 articles [sw23360]
  • Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. Fuzz testing has proven successful...
  • BackFlow

  • Referenced in 1 article [sw34336]
  • been widely applied to detect injection vulnerabilities in real world software. A main drawback...
  • ASPIER

  • Referenced in 6 articles [sw09852]
  • extends the iterative abstraction-refinement methodology for software model checking with a domain-specific protocol ... context of OpenSSL verification. ASPIER detected the ”version-rollback” vulnerability in OpenSSL 0.9.6c source...
  • EIOD

  • Referenced in 1 article [sw10040]
  • alleviate the problem that static vulnerability detection has high false positive rate ... overflow vulnerabilities. Our approach is static so that it does not run the software directly ... EIOD can effectively and efficiently detect integer overflow vulnerabilities...
  • OSS-Fuzz

  • Referenced in 0 articles [sw36429]
  • uncovering programming errors in software. Many of these detectable errors, like buffer overflow, can have ... implications. Google has found thousands of security vulnerabilities and stability bugs by deploying guided...
  • Cujo

  • Referenced in 1 article [sw37812]
  • Cujo: efficient detection and prevention of drive-by-download attacks. The JavaScript language ... exploiting vulnerabilities in web browsers and their extensions for unnoticeably downloading malicious software ... present Cujo, a system for automatic detection and prevention of drive-by-download attacks. Embedded...
  • ASPIC

  • Referenced in 3 articles [sw17147]
  • often being computationally expensive, this approach is vulnerable to several problems--hence the need ... multiple genome-EST alignment algorithm, for the detection of splice sites. To avoid limitations ... predictor based on this algorithm in the software tool ASPIC (Alternative Splicing PredICtion...
  • SSUKey

  • Referenced in 1 article [sw34179]
  • software solution, SSUKey, adopting CPU security features to protect private keys against the vulnerabilities ... carefully designed and configured to mitigate the vulnerabilities of Intel SGX, including side channel ... monitor the usage of private keys and detect abnormal behaviors. Finally, we implement SSUKey...
  • SGS

  • Referenced in 1 article [sw38855]
  • Against DDoS Attacks in Software-Defined Networking. Software-defined networking (SDN) achieves flexible and efficient ... potential bottleneck, and adversaries can exploit this vulnerability to launch distributed denial-of-service (DDoS ... organized in two modules: anomaly traffic detection and controller dynamic defense. Anomaly traffic detection focuses...
  • SAFEWAPI

  • Referenced in 1 article [sw38000]
  • applications which may lead to severe security vulnerabilities. To help developers write safe JavaScript ... that use the Web APIs and to detect possible misuses of Web APIs ... developers unlike pure JavaScript functions, we can detect wrong uses of Web APIs precisely ... representative misuses of Web APIs defined by software quality assurance engineers, our SAFEWAPI detects such...
  • CUTE

  • Referenced in 65 articles [sw00177]
  • CUTE: a concolic unit testing engine for C...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • ScaLAPACK

  • Referenced in 418 articles [sw00830]
  • ScaLAPACK is an acronym for scalable linear algebra...
  • PRISM

  • Referenced in 442 articles [sw01186]
  • PRISM: Probabilistic symbolic model checker. In this paper...