Back to Search
Start Over
Analysis of Potential Code Vulnerabilities Involving Overlapping Instructions
- Source :
- Lecture Notes in Computer Science ISBN: 9783319662831, SAFECOMP Workshops
- Publication Year :
- 2017
- Publisher :
- Springer International Publishing, 2017.
-
Abstract
- This article proposes approaches supporting the analysis of code vulnerabilities based on overlapping machine instructions of variable length. For the purpose of focusing the search for potential malicious code it is suggested to apply first disassembling techniques allowing for a restriction of potentially exploitable memory space. Successively, testing based on heuristic optimization may be applied in order to evaluate dynamically the practicality of vulnerability exploitation.
- Subjects :
- 0301 basic medicine
Computer science
Heuristic (computer science)
Vulnerability
020207 software engineering
02 engineering and technology
Space (commercial competition)
computer.software_genre
Variable length
03 medical and health sciences
030104 developmental biology
Order (exchange)
0202 electrical engineering, electronic engineering, information engineering
Code (cryptography)
Data mining
computer
Subjects
Details
- ISBN :
- 978-3-319-66283-1
- ISBNs :
- 9783319662831
- Database :
- OpenAIRE
- Journal :
- Lecture Notes in Computer Science ISBN: 9783319662831, SAFECOMP Workshops
- Accession number :
- edsair.doi...........a93a2666f2555b2393a3e4260cf421a9
- Full Text :
- https://doi.org/10.1007/978-3-319-66284-8_10