메뉴 건너뛰기




Volumn 3639, Issue , 2005, Pages 2-23

Execution generated test cases: How to make systems code crash itself

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SOFTWARE; ERROR ANALYSIS; INTERFACES (COMPUTER); PROBLEM SOLVING; SOFTWARE ENGINEERING;

EID: 26944472789     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11537328_2     Document Type: Conference Paper
Times cited : (130)

References (29)
  • 1
    • 33751059192 scopus 로고    scopus 로고
    • Execution generated test cases: How to make systems code crash itself
    • Stanford University
    • Cadar, C., Engler, D.: Execution generated test cases: How to make systems code crash itself. Technical Report CSTR 2005-04 3, Stanford University (2005)
    • (2005) Technical Report , vol.CSTR 2005-04 3
    • Cadar, C.1    Engler, D.2
  • 4
    • 0003577356 scopus 로고
    • Fuzz revisited: A re-examination of the reliability of UNIX utilities and services
    • University of Wisconsin - Madison
    • Miller, B., Koski, D., Lee, C.P., Maganty, V., Murthy, R., Natarajan, A., Steidl, J.: Fuzz revisited: A re-examination of the reliability of UNIX utilities and services. Technical report, University of Wisconsin - Madison (1995)
    • (1995) Technical Report
    • Miller, B.1    Koski, D.2    Lee, C.P.3    Maganty, V.4    Murthy, R.5    Natarajan, A.6    Steidl, J.7
  • 5
    • 35048835830 scopus 로고    scopus 로고
    • CVC Lite: A new implementation of the cooperating valid ity checker
    • Alur, R., Peled, D.A., eds.: CAV
    • Barrett, C., Berezin, S.: CVC Lite: A new implementation of the cooperating valid ity checker. In Alur, R., Peled, D.A., eds.: CAV. Lecture Notes in Computer Science, Springer (2004)
    • (2004) Lecture Notes in Computer Science, Springer
    • Barrett, C.1    Berezin, S.2
  • 8
    • 26944501688 scopus 로고    scopus 로고
    • Securiteam: Mutt exploit. http://www.securiteam.com/unixfocus/5FP0T0U9FU. html (2003)
    • (2003) Mutt Exploit
  • 10
    • 26944462088 scopus 로고    scopus 로고
    • : Wsmp3 webpage. http://wsmp3.sourceforge.net/ (2005)
    • (2005) Wsmp3 Webpage
  • 11
    • 26944449029 scopus 로고    scopus 로고
    • Associates, C.: Wsmp3 exploit. http://www3.ca.com/securityadvisor/ vulninfo/Vuln.aspx?ID=15609 (2003)
    • (2003) Wsmp3 Exploit
  • 12
    • 26944449029 scopus 로고    scopus 로고
    • Secunia: Wsmp3 exploit, http://secunia.com/product/801/ (2003)
    • (2003) Wsmp3 Exploit
  • 13
    • 0016674309 scopus 로고
    • Select - A formal system for testing and debugging programs by symbolic execution
    • Boyer, R.S., Elspas, B., Levitt, K.N.: Select - a formal system for testing and debugging programs by symbolic execution. ACM SIGPLAN Notices 10 (1975) 234-45
    • (1975) ACM SIGPLAN Notices , vol.10 , pp. 234-245
    • Boyer, R.S.1    Elspas, B.2    Levitt, K.N.3
  • 18
    • 0029723725 scopus 로고    scopus 로고
    • The chaining approach for software test data generation
    • Ferguson, R., Korel, B.: The chaining approach for software test data generation. ACM Trans. Softw. Eng. Methodol. 5 (1996) 63-86
    • (1996) ACM Trans. Softw. Eng. Methodol. , vol.5 , pp. 63-86
    • Ferguson, R.1    Korel, B.2
  • 21
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • Holzmann, G.J.: The model checker SPIN. Software Engineering 23 (1997)279-295
    • (1997) Software Engineering , vol.23 , pp. 279-295
    • Holzmann, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.