@inproceedings{8dde0429569b423d91eb11555fa21706,
title = "An overview of a proof-based approach to detecting C vulnerabilities",
abstract = "This paper gives an overview of a formal approach for detecting vulnerabilities in C programs using the B formal method. Vulnerabilities denote faults that may be introduced unintentionally into programs making them behave incorrectly. Such faults (or programing errors) may lead to unpredictable behavior and even worse well-motivated attackers may exploit them later to cause real damages. Basically, the proposed approach consists in translating the vulnerable aspects of a C program into a B specification. On this B specification proof and model checking activities are performed in order to detect the presence or absence of vulnerabilities. Compared to the existing vulnerability detection techniques, a proof-based approach permits to eliminate false alarms and denial of service attacks.",
keywords = "B formal method, mapping rules, model checking, proofs, security, vulnerability detection",
author = "Amel Mammar",
year = "2011",
month = jun,
day = "23",
doi = "10.1145/1982185.1982476",
language = "English",
isbn = "9781450301138",
series = "Proceedings of the ACM Symposium on Applied Computing",
pages = "1343--1344",
booktitle = "26th Annual ACM Symposium on Applied Computing, SAC 2011",
note = "26th Annual ACM Symposium on Applied Computing, SAC 2011 ; Conference date: 21-03-2011 Through 24-03-2011",
}