Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation

Full metadata record
DC Field Value Language
dc.contributor.authorJang, Young-Su-
dc.contributor.authorChoi, Jin-Young-
dc.date.accessioned2021-09-02T02:32:36Z-
dc.date.available2021-09-02T02:32:36Z-
dc.date.created2021-06-19-
dc.date.issued2018-12-
dc.identifier.issn1745-1361-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/71385-
dc.description.abstractThe security of a software program critically depends on the prevention of vulnerabilities in the source code; however, conventional computer programs lack the ability to identify vulnerable code in another program. Our research was aimed at developing a technique capable of generating substitution code for the detection of buffer overflow vulnerability in C/C++ programs. The technique automatically verifies and sanitizes code instrumentation by comparing the result of each candidate variable with that expected from the input data. Our results showed that statements containing buffer overflow vulnerabilities could be detected and prevented by using a substitution variable and by sanitizing code vulnerabilities based on the size of the variables. Thus, faults can be detected prior to execution of the statement, preventing malicious access. Our approach is particularly useful for enhancing software security monitoring, and for designing retrofitting techniques in applications.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectSOFTWARE-
dc.titleAutomatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation-
dc.typeArticle-
dc.contributor.affiliatedAuthorChoi, Jin-Young-
dc.identifier.doi10.1587/transinf.2018EDP7192-
dc.identifier.scopusid2-s2.0-85057534389-
dc.identifier.wosid000451766500017-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.12, pp.3005 - 3018-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE101D-
dc.citation.number12-
dc.citation.startPage3005-
dc.citation.endPage3018-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusSOFTWARE-
dc.subject.keywordAuthorinformation security-
dc.subject.keywordAuthorbuffer overflow vulnerability-
dc.subject.keywordAuthorsoftware security monitoring-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher CHOI, Jin Young photo

CHOI, Jin Young
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE