search menu icon-carat-right cmu-wordmark

Automated Code Repair to Ensure Memory Safety (2019)

October 2019 Poster
William Klieber

This poster illustrates research to developed automated techniques to repair C source code.


Software vulnerabilities constitute a major threat to DoD. Memory violations are among the most
common and most severe types of vulnerabilities. The main technique that we use (fat pointers) has been previously researched as a compiler pass to repair the intermediate representation (IR) of a program. Our work is novel in applying it as a source-code repair, which poses the difficulty of translating the repairs at the IR level back to source code.