Resolving input validation vulnerabilities by retracing taint flow through source code.
Justin SmithPublished in: VL/HCC (2016)
Keyphrases
- source code
- open source
- software systems
- open source software
- software maintenance
- software evolution
- software projects
- execution traces
- linux kernel
- buffer overflow
- static analysis
- high level
- plagiarism detection
- information security
- open source projects
- program slicing
- reverse engineer
- impact analysis
- automated tools
- symbolic execution
- software repositories
- security policies
- computer systems