Fan Zhang, Junwei Cao, et al.
IEEE TETC
In this paper we survey static analysis methods for identifying security vulnerabilities in software systems. We cover three areas that have been associated with sources of security vulnerabilities: access-control, information-flow, and application-programming-interface conformance. Because access control mechanisms fall into two major categories, stack-based access control and role-based access control, we discuss static analysis techniques for these two areas of access control separately. Similarly, security violations pertaining to information flow consist of integrity violations and confidentiality violations, and consequently, our discussion of static analysis techniques for information-flow vulnerabilities includes these two topics. For each type of security vulnerability we present our findings in two parts: in the first part we describe recent research results, and in the second part we illustrate implementation techniques by describing selected static analysis algorithms. © 2007 IBM.
Fan Zhang, Junwei Cao, et al.
IEEE TETC
Donald Samuels, Ian Stobert
SPIE Photomask Technology + EUV Lithography 2007
György E. Révész
Theoretical Computer Science
Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008