Barenghi et al., 2018 - Google Patents
Systematic parsing of X. 509: eradicating security issues with a parse treeBarenghi et al., 2018
View PDF- Document ID
- 6953057869471520804
- Author
- Barenghi A
- Mainardi N
- Pelosi G
- Publication year
- Publication venue
- Journal of Computer Security
External Links
Snippet
X. 509 certificate parsing and validation is a critical task which has shown consistent lack of effectiveness, with practical attacks being reported with a steady rate during the last 10 years. In this work we analyze the X. 509 standard and provide a grammar description of it …
- 238000010200 validation analysis 0 abstract description 82
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8635602B2 (en) | Verification of information-flow downgraders | |
Momot et al. | The seven turrets of babel: A taxonomy of langsec errors and how to expunge them | |
Cortier et al. | Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols | |
Li et al. | Guardians of the ledger: Protecting decentralized exchanges from state derailment defects | |
Wang et al. | Smartinv: Multimodal learning for smart contract invariant inference | |
US11188911B2 (en) | Object oriented smart contracts for UTXO-based blockchains | |
Li et al. | Cobra: interaction-aware bytecode-level vulnerability detector for smart contracts | |
US11429688B2 (en) | Correcting a URL within a REST API call | |
Barenghi et al. | Systematic parsing of X. 509: eradicating security issues with a parse tree | |
Srinivasan | TP-detect: trigram-pixel based vulnerability detection for ethereum smart contracts | |
Li et al. | Autoformalize mathematical statements by symbolic equivalence and semantic consistency | |
Lasser et al. | CoStar: a verified ALL (*) parser | |
Liu et al. | Automated invariant generation for solidity smart contracts | |
Dubniczky et al. | Castle: Benchmarking dataset for static code analyzers and llms towards cwe detection | |
Yu et al. | Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection | |
Debnath et al. | ARMOR: A formally verified implementation of X. 509 certificate chain validation | |
Okun et al. | Report on the third static analysis tool exposition (sate 2010) | |
US20240291681A1 (en) | System And Method For Managing Exception Request Blocks In A Blockchain Network | |
Alrabaee et al. | Decoupling coding habits from functionality for effective binary authorship attribution | |
Yu et al. | Llm-enhanced software patch localization | |
CN119106424A (en) | Smart contract auditing method, device, blockchain system and computer equipment | |
US20220084021A1 (en) | Object Oriented Smart Contracts for UTXO-Based Blockchains | |
Bisht et al. | Automated detection of parameter tampering opportunities and vulnerabilities in web applications | |
Okun et al. | Static analysis tool exposition (SATE) 2008 | |
Alsunaidi et al. | MultiTagging: A Vulnerable Smart Contract Labeling and Evaluation Framework |