Automated Crash Filtering for ARM Binary Programs

This paper aims to help to differentiate security related crashes from benign vulnerabilities, using static taint-analysis. To achieve this goal, we propose a tool named Crash Filter, which determines if a crash can be made to be exploitable or not, by analyzing ARM binary codes. We envision that th...

Full description

Saved in:
Bibliographic Details
Published in2015 IEEE 39th Annual Computer Software and Applications Conference Vol. 2; pp. 478 - 483
Main Authors Eom, Ki-Jin, Paik, Joon-Young, Mok, Seong-Kyun, Jeon, Hyeon-Gu, Cho, Eun-Sun, Kim, Dong-Woo, Ryu, Jaecheol
Format Conference Proceeding Journal Article
LanguageEnglish
Published IEEE 01.07.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper aims to help to differentiate security related crashes from benign vulnerabilities, using static taint-analysis. To achieve this goal, we propose a tool named Crash Filter, which determines if a crash can be made to be exploitable or not, by analyzing ARM binary codes. We envision that the proposed analysis would help to timely fix security-critical bugs.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Conference-1
ObjectType-Feature-3
content type line 23
SourceType-Conference Papers & Proceedings-2
ISSN:0730-3157
DOI:10.1109/COMPSAC.2015.139