An overview of a proof-based approach to detecting C vulnerabilities

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper gives an overview of a formal approach for detecting vulnerabilities in C programs using the B formal method. Vulnerabilities denote faults that may be introduced unintentionally into programs making them behave incorrectly. Such faults (or programing errors) may lead to unpredictable behavior and even worse well-motivated attackers may exploit them later to cause real damages. Basically, the proposed approach consists in translating the vulnerable aspects of a C program into a B specification. On this B specification proof and model checking activities are performed in order to detect the presence or absence of vulnerabilities. Compared to the existing vulnerability detection techniques, a proof-based approach permits to eliminate false alarms and denial of service attacks.

Original languageEnglish
Title of host publication26th Annual ACM Symposium on Applied Computing, SAC 2011
Pages1343-1344
Number of pages2
DOIs
Publication statusPublished - 23 Jun 2011
Event26th Annual ACM Symposium on Applied Computing, SAC 2011 - TaiChung, Taiwan, Province of China
Duration: 21 Mar 201124 Mar 2011

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

Conference26th Annual ACM Symposium on Applied Computing, SAC 2011
Country/TerritoryTaiwan, Province of China
CityTaiChung
Period21/03/1124/03/11

Keywords

  • B formal method
  • mapping rules
  • model checking
  • proofs
  • security
  • vulnerability detection

Fingerprint

Dive into the research topics of 'An overview of a proof-based approach to detecting C vulnerabilities'. Together they form a unique fingerprint.

Cite this