Resolving constraint conflicts
Trent Jaeger, Reiner Sailer, et al.
SACMAT 2004
The importance of software security cannot be overstated. In the past, researchers have applied program analysis techniques to automatically detect security vulnerabilities and verify security properties. However, such techniques have limited success in reality because they require manually provided code-level security specifications. Manually writing and generating these code-level security specifications are tedious and error-prone. Additionally, they seldom exist in production software. In this paper, we propose a novel method and tool, called AutoISES, which Automatically Infers Security Specifications by statically analyzing source code, and then directly use these specifications to automatically detect security violations. Our experiments with the Linux kernel and Xen demonstrated the effectiveness of this approach – AutoISES automatically generated 84 security specifications and detected 8 vulnerabilities in the Linux kernel and Xen, 7 of which have already been confirmed by the corresponding developers.
Trent Jaeger, Reiner Sailer, et al.
SACMAT 2004
Jinqiu Yang, Erik Wittern, et al.
MSR/ICSE 2018
Trent Jaeger, Reiner Sailer, et al.
USENIX Security 2003
Trent Jaeger, Xiaolan Zhang, et al.
ACM TISSEC