Marcos Álvares Barbosa Junior, T. Marwala, Fernando Buarque de Lima-Neto
{"title":"计算智能在静态软件检查内存损坏漏洞中的应用","authors":"Marcos Álvares Barbosa Junior, T. Marwala, Fernando Buarque de Lima-Neto","doi":"10.1109/CICYBS.2013.6597207","DOIUrl":null,"url":null,"abstract":"We are living in an era where technology has become an essential resource for modern human welfare. Critical services like water supply, energy and transportation are controlled by computational systems. These systems must be reliable and constantly audited against software and hardware failures and malicious attacks. As a preventive approach against software vulnerabilities on critical systems, this research presents applications of computational intelligence to program analysis for vulnerability checking. This paper shows that computational intelligence techniques can successfully uncover several arithmetic and memory manipulation vulnerabilities.","PeriodicalId":178381,"journal":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Applications of computational intelligence for static software checking against memory corruption vulnerabilities\",\"authors\":\"Marcos Álvares Barbosa Junior, T. Marwala, Fernando Buarque de Lima-Neto\",\"doi\":\"10.1109/CICYBS.2013.6597207\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We are living in an era where technology has become an essential resource for modern human welfare. Critical services like water supply, energy and transportation are controlled by computational systems. These systems must be reliable and constantly audited against software and hardware failures and malicious attacks. As a preventive approach against software vulnerabilities on critical systems, this research presents applications of computational intelligence to program analysis for vulnerability checking. This paper shows that computational intelligence techniques can successfully uncover several arithmetic and memory manipulation vulnerabilities.\",\"PeriodicalId\":178381,\"journal\":{\"name\":\"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICYBS.2013.6597207\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICYBS.2013.6597207","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applications of computational intelligence for static software checking against memory corruption vulnerabilities
We are living in an era where technology has become an essential resource for modern human welfare. Critical services like water supply, energy and transportation are controlled by computational systems. These systems must be reliable and constantly audited against software and hardware failures and malicious attacks. As a preventive approach against software vulnerabilities on critical systems, this research presents applications of computational intelligence to program analysis for vulnerability checking. This paper shows that computational intelligence techniques can successfully uncover several arithmetic and memory manipulation vulnerabilities.