Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00262
Meng Zhang, Dehui Du, Mingzhuo Zhang, Lei Zhang, Yao Wang, Wentao Zhou
{"title":"A Meta-Modeling Approach for Autonomous Driving Scenario Based on STTD","authors":"Meng Zhang, Dehui Du, Mingzhuo Zhang, Lei Zhang, Yao Wang, Wentao Zhou","doi":"10.21655/ijsi.1673-7288.00262","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00262","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126335449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the rapid development of mobile computing, IoT, cloud computing, artificial intelligence, etc, many new programming languages and compilers are emerging. Even so, C/C++ language is still one of the most popular languages. And array is one of the most important data structures of C language. It is necessary to check whether the index is within the boundary of the array when using it to access the element of an array in a program. Otherwise, array index out-of-bounds will happen unexpectedly. When there are array index out-of-bounds defects existing in programs, some serious errors may occur during execution, such as system crash. It is even worse that array index out-of-bounds defects open the doors for attackers to take control of the server and execute arbitrary malicious code by carefully constructing input and intercepting the control flow of the programs. Existing static methods for array boundary checking cannot ∗ 基金项目: 国家重点研发计划(2017YFA0700604); 南京大学优秀博士研究生创新能力提升计划 B; 江苏省研究生科研与实践
{"title":"Static Checking of Array Index Out-of-Bounds Defects in C Programs Based on Taint Analysis","authors":"Fengjuan Gao, Yu Wang, Tianjiao Chen, Lingyun Situ, Linzhang Wang, Xuandong Li","doi":"10.21655/ijsi.1673-7288.00246","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00246","url":null,"abstract":"During the rapid development of mobile computing, IoT, cloud computing, artificial intelligence, etc, many new programming languages and compilers are emerging. Even so, C/C++ language is still one of the most popular languages. And array is one of the most important data structures of C language. It is necessary to check whether the index is within the boundary of the array when using it to access the element of an array in a program. Otherwise, array index out-of-bounds will happen unexpectedly. When there are array index out-of-bounds defects existing in programs, some serious errors may occur during execution, such as system crash. It is even worse that array index out-of-bounds defects open the doors for attackers to take control of the server and execute arbitrary malicious code by carefully constructing input and intercepting the control flow of the programs. Existing static methods for array boundary checking cannot ∗ 基金项目: 国家重点研发计划(2017YFA0700604); 南京大学优秀博士研究生创新能力提升计划 B; 江苏省研究生科研与实践","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00258
Qian Lu, Xiaojuan Li, Yong Guan, Rui Wang, Zhiping Shi
{"title":"Modeling and Analysis of Data Flow-Oriented ROS2 Data Distribution Service","authors":"Qian Lu, Xiaojuan Li, Yong Guan, Rui Wang, Zhiping Shi","doi":"10.21655/ijsi.1673-7288.00258","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00258","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126066046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}