[llvm-commits] CVS: llvm-www/pubs/2008-03-TR-UIDependAnalysis.html 2008-03-TR-UIDependAnalysis.pdf
John Criswell
criswell at cs.uiuc.edu
Mon May 12 08:46:22 PDT 2008
Changes in directory llvm-www/pubs:
2008-03-TR-UIDependAnalysis.html added (r1.1)
2008-03-TR-UIDependAnalysis.pdf added (r1.1)
---
Log message:
Added tech report using LLVM from Sun Microsystems.
Permission given by Cristina Cifuentes.
---
Diffs of the changes: (+56 -0)
2008-03-TR-UIDependAnalysis.html | 56 +++++++++++++++++++++++++++++++++++++++
1 files changed, 56 insertions(+)
Index: llvm-www/pubs/2008-03-TR-UIDependAnalysis.html
diff -c /dev/null llvm-www/pubs/2008-03-TR-UIDependAnalysis.html:1.1
*** /dev/null Mon May 12 10:45:39 2008
--- llvm-www/pubs/2008-03-TR-UIDependAnalysis.html Mon May 12 10:45:28 2008
***************
*** 0 ****
--- 1,56 ----
+ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
+ <html>
+ <head>
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+ <link rel="stylesheet" href="../llvm.css" type="text/css" media="screen" />
+ <title>User-Input Dependence Analysis via Graph Reachability</title>
+ </head>
+ <body>
+
+ <div class="pub_title">
+ User-Input Dependence Analysis via Graph Reachability
+ </div>
+ <div class="pub_author">
+ <a href="http://research.sun.com/techrep/authors/Scholz,+Bernard.html">
+ Bernard Scholz</a>,
+ <a href="http://research.sun.com/techrep/authors/Zhang,+Chenyi.html">
+ Chenyi Zhang</a>,
+ and
+ <a href="http://research.sun.com/techrep/authors/Cifuentes,+Cristina.html">
+ Cristina Cifuentes</a>
+ </div>
+
+ <h2>Abstract:</h2>
+ <blockquote>
+ <p>
+ Security vulnerabilities are software bugs that are exploited by an attacker. Systems software is at high risk of exploitation: attackers commonly exploit security vulnerabilities to gain control over a system, remotely, over the internet. Bug-checking tools have been used with fair success in recent years to automatically find bugs in software. However, for finding software bugs that can cause security vulnerabilities, a bug checking tool must determine whether the software bug can be controlled by user-input.
+ </p>
+
+ <p>
+ In this paper we introduce a static program analysis for computing user-input dependencies. This analysis is used as a pre-processing filter to our static bug checking tool, currently under development, to identify bugs that can be exploited as security vulnerabilities. Runtime speed and scalability of the user-input dependence analysis is of key importance if the analysis is used for large commercial systems software.
+ </p>
+
+ <p>
+ Our user-input dependency analysis takes both data and control dependencies into account. We extend Static Single Assignment (SSA) form by augmenting phi-nodes with control dependencies of its arguments. A formal definition of user-input dependency is expressed in a dataflow analysis framework as a Meet-Over-all-Paths (MOP) solution. We reduce the equation system to a sparse equation system exploiting the properties of SSA. The sparse equation system is solved as a reachability problem that results in a fast algorithm for computing user-input dependencies. We have implemented a call-insensitive and a call-sensitive version of the analysis. The paper compares their efficiency for various systems codes.
+ </p>
+ </blockquote>
+
+ <h2>Bibtex:</h2>
+ <pre>
+ @techreport{SunTR171:2008,
+ author = "Bernard Scholz and Chenyi Zhang and Cristina Cifuentes",
+ title = "{User-Input Dependence Analysis via Graph Reachability}",
+ number = "TR-2008-171",
+ month = "March",
+ year = "2008",
+ url = "http://research.sun.com/techrep/2008/abstract-171.html"
+ }
+ </pre>
+
+ <h2>Download:</h2>
+ <ul>
+ <li><a href="2008-03-TR-UIDependAnalysis.pdf">User-Input Dependence Analysis via Graph Reachability</a> (PDF)</li>
+ </ul>
+
+ </body>
+ </html>
More information about the llvm-commits
mailing list