Show simple item record

dc.contributor.authorSidiroglou-Douskos, Stelios
dc.contributor.authorLahtinen, Eric
dc.contributor.authorPiselli, Paolo
dc.contributor.authorLong, Fan
dc.contributor.authorKim, Deokhwan
dc.contributor.authorRinard, Martin C.
dc.contributor.authorRittenhouse, Nathan (Nathan W.)
dc.date.accessioned2015-03-24T18:38:23Z
dc.date.available2015-03-24T18:38:23Z
dc.date.issued2015-03
dc.identifier.isbn9781450328357
dc.identifier.urihttp://hdl.handle.net/1721.1/96155
dc.description.abstractWe present a new technique and system, DIODE, for auto- matically generating inputs that trigger overflows at memory allocation sites. DIODE is designed to identify relevant sanity checks that inputs must satisfy to trigger overflows at target memory allocation sites, then generate inputs that satisfy these sanity checks to successfully trigger the overflow. DIODE works with off-the-shelf, production x86 binaries. Our results show that, for our benchmark set of applications, and for every target memory allocation site exercised by our seed inputs (which the applications process correctly with no overflows), either 1) DIODE is able to generate an input that triggers an overflow at that site or 2) there is no input that would trigger an overflow for the observed target expression at that site.en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency (Grant FA8650-11-C-7192)en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2694344.2694389en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceSidiroglou-Douskos, Steliosen_US
dc.titleTargeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcementen_US
dc.typeArticleen_US
dc.identifier.citationSidiroglou-Douskos, Stelios et al. “Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement.” Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2015) (March 2015): 473–486.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorLong, Fanen_US
dc.contributor.mitauthorKim, Deokhwanen_US
dc.contributor.mitauthorRinard, Martin C.en_US
dc.contributor.mitauthorSidiroglou-Douskos, Steliosen_US
dc.contributor.mitauthorLahtinen, Ericen_US
dc.contributor.mitauthorRittenhouse, Nathan (Nathan W.)en_US
dc.contributor.mitauthorPiselli, Paoloen_US
dc.relation.journalProceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2015)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsSidiroglou-Douskos, Stelios; Lahtinen, Eric; Rittenhouse, Nathan; Piselli, Paolo; Long, Fan; Kim, Deokhwan; Rinard, Martinen_US
dc.identifier.orcidhttps://orcid.org/0000-0002-6232-3118
dc.identifier.orcidhttps://orcid.org/0000-0001-8195-4145
dc.identifier.orcidhttps://orcid.org/0000-0001-8095-8523
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record