Applications of computational intelligence for static software checking against memory corruption vulnerabilities

Marcos Alvares, Tshilidzi Marwala, Fernando Buarque De Lima Neto

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

We are living in an era where technology has become an essential resource for modern human welfare. Critical services like water supply, energy and transportation are controlled by computational systems. These systems must be reliable and constantly audited against software and hardware failures and malicious attacks. As a preventive approach against software vulnerabilities on critical systems, this research presents applications of computational intelligence to program analysis for vulnerability checking. This paper shows that computational intelligence techniques can successfully uncover several arithmetic and memory manipulation vulnerabilities.

Original languageEnglish
Title of host publicationProceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013
Pages59-66
Number of pages8
DOIs
Publication statusPublished - 2013
Event2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013 - Singapore, Singapore
Duration: 16 Apr 201319 Apr 2013

Publication series

NameProceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013

Conference

Conference2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013
Country/TerritorySingapore
CitySingapore
Period16/04/1319/04/13

ASJC Scopus subject areas

  • Artificial Intelligence
  • Software

Fingerprint

Dive into the research topics of 'Applications of computational intelligence for static software checking against memory corruption vulnerabilities'. Together they form a unique fingerprint.

Cite this