An integer overflow detection method based on integer variable unification

被引:0
|
作者
Xu, Guo-Ai [1 ]
Zhang, Miao [1 ]
Chen, Ai-Guo [1 ]
Li, Zhong-Xian [2 ]
机构
[1] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] National Cybernet Security Limited, Tianjin 300052, China
关键词
Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
Through analyzing the principium of integer overflow, an integer overflow detection method on software source code is proposed which is based on integer variable unification. We presented the integer variable unification method and defined three unified actions which were used in three given cases. Then the detection process was described, it simplified integer overflow flaw into mathematic inequalities, and removed the influence of context to the objective variable. Finally, instances were provided to demonstrate the effectiveness and practicability of the presented method.
引用
收藏
页码:90 / 93
相关论文
共 50 条
  • [1] Method of integer overflow detection to avoid buffer overflow
    School of Computer Science and Engineering, Southeast University, Nanjing 211189, China
    不详
    [J]. J. Southeast Univ. Engl. Ed., 2009, 2 (219-223):
  • [2] Integer squarers with overflow detection
    Gok, Mustafa
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2008, 34 (05) : 378 - 391
  • [3] Integer multipliers with overflow detection
    Gok, Mustafa
    Schulte, Michael J.
    Arnold, Mark G.
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (08) : 1062 - 1066
  • [4] A runtime-testing method for integer overflow detection based on metamorphic relations
    Hui, Zhan-Wei
    Huang, Song
    Ji, Meng-Yu
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (04) : 2349 - 2361
  • [5] Integer multiplication with overflow detection or saturation
    Schulte, MJ
    Balzola, PI
    Akkas, A
    Brocato, RW
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2000, 49 (07) : 681 - 691
  • [6] Efficient integer multiplication overflow detection circuits
    Gok, M
    Schulte, MJ
    Balzola, PI
    [J]. CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 1661 - 1665
  • [7] Integer Overflow Detection with Delayed Runtime Test
    Huang, Zhen
    Yu, Xiaowei
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [8] A Smart Fuzzing Approach for Integer Overflow Detection
    Cai, Jun
    Zou, Peng
    He, Jun
    Ma, Jinxin
    [J]. INFORMATION TECHNOLOGY IN INDUSTRY, 2014, 2 (03): : 98 - 103
  • [9] Integer Overflow Detection in Hardware Designs at the Specification Level
    Bornebusch, Fritjof
    Lueth, Christoph
    Wille, Robert
    Drechsler, Rolf
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD), 2020, : 41 - 48
  • [10] New AspectJ Pointcuts for Integer Overflow and Underflow Detection
    Alhadidi, D.
    Debbabi, M.
    Bhattacharya, P.
    [J]. INFORMATION SECURITY JOURNAL, 2008, 17 (5-6): : 278 - 287