Download now Free registration required
Implementation-level vulnerabilities are a persistent threat to the security of computing systems. The authors propose using the results of partially-successful verification attempts to place a numerical upper bound on the insecurity of systems, in order to motivate improvement. Despite recent attention to secure computing, programs continue to be plagued with vulnerabilities. While some of these vulnerabilities are due to deep logical errors, most are due to implementation bugs such as buffer overflows and other input validation errors.
- Format: PDF
- Size: 147.1 KB