当前位置:
X-MOL 学术
›
Program. Comput. Softw.
›
论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Dynamic Detection of Use-After-Free Bugs
Programming and Computer Software ( IF 0.7 ) Pub Date : 2019-12-16 , DOI: 10.1134/s0361768819070028 S. A. Asryan , S. S. Gaissaryan , Sh. F. Kurmangaleev , A. M. Aghabalyan , N. G. Hovsepyan , S. S. Sargsyan
中文翻译:
动态检测释放后使用的错误
更新日期:2019-12-16
Programming and Computer Software ( IF 0.7 ) Pub Date : 2019-12-16 , DOI: 10.1134/s0361768819070028 S. A. Asryan , S. S. Gaissaryan , Sh. F. Kurmangaleev , A. M. Aghabalyan , N. G. Hovsepyan , S. S. Sargsyan
Abstract
A novel method for detecting use-after-free bugs based on the program dynamic analysis is described. In memory unsafe programming languages, such as C or C++, this class of bugs mainly occurs when the program tries to access an area of dynamically allocated memory that has been already freed. For each program execution path, the method checks the correction of the allocation, deallocation, and access operations. Since the dynamic analysis is used, bugs can be found only in the parts of the code that was actually executed. The symbolic program execution with the help of SMT (Satisfiability Modulo Theories) solvers is used. This allows us to generate data the processing of which produces new execution paths.中文翻译:
动态检测释放后使用的错误