-
1
-
-
33751042305
-
-
Dynamorio
-
Dynamorio. http://www.cag.lcs.mit.edu/dynamorio/.
-
-
-
-
2
-
-
33751045207
-
-
K2, admmutate
-
K2, admmutate. http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz.
-
-
-
-
3
-
-
33751056518
-
-
Metasploit. http://metasploit.org.
-
-
-
-
4
-
-
0004072686
-
-
Addison-Wesley Publishing Company
-
A. Aho, R. Sethi, and J. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley Publishing Company, 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.1
Sethi, R.2
Ullman, J.3
-
7
-
-
33751035317
-
Design space and analysis of worm defense systems
-
CMU TR CMU-CS-05-156
-
D. Brumley, L.-H. Liu, P. Poosank, and D. Song. Design space and analysis of worm defense systems. In Proc of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS), 2006. CMU TR CMU-CS-05-156.
-
(2006)
Proc of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS)
-
-
Brumley, D.1
Liu, L.-H.2
Poosank, P.3
Song, D.4
-
8
-
-
33751029655
-
-
Technical Report CMU-CS-06-108, Carnegie Mellon University
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. Technical Report CMU-CS-06-108, Carnegie Mellon University, 2006.
-
(2006)
Towards Automatic Generation of Vulnerability-based Signatures
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
9
-
-
0011209721
-
Modeling and verifying systems using a logic of counter arithmetic with lambda expressions and uninterpreted functions
-
R. E. Bryant, S. K. Lahiri, and S. A. Seshia. Modeling and verifying systems using a logic of counter arithmetic with lambda expressions and uninterpreted functions. In Proc. Computer-Aided Verification (CAV), 2002.
-
(2002)
Proc. Computer-aided Verification (CAV)
-
-
Bryant, R.E.1
Lahiri, S.K.2
Seshia, S.A.3
-
13
-
-
35248891044
-
Precise analysis of string expressions
-
Proc. 10th International Static Analysis Symposium, SAS '03, Springer-Verlag, June
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proc. 10th International Static Analysis Symposium, SAS '03, volume 2694 of LNCS, pages 1-18. Springer-Verlag, June 2003. Available from http://www.brics.dk/JSA/.
-
(2003)
LNCS
, vol.2694
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
16
-
-
35048861896
-
A tool for checking ANSI-C programs
-
K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), Springer
-
E. Clarke, D. Kroening, and F. Lerda. A tool for checking ANSI-C programs. In K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), volume 2988 of Lecture Notes in Computer Science, pages 168-176. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2988
, pp. 168-176
-
-
Clarke, E.1
Kroening, D.2
Lerda, F.3
-
26
-
-
0003620778
-
-
Addison-Wesley
-
J. Hopcroft, R. Motwani, and J. Ullman. Introduction to automata theory, langauges, and computation. Addison-Wesley, 2001.
-
(2001)
Introduction to Automata Theory, Langauges, and Computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
31
-
-
0016971687
-
Symbolic execution and program testing
-
J. King. Symbolic execution and program testing. Communications of the ACM, 19:386-394, 1976.
-
(1976)
Communications of the ACM
, vol.19
, pp. 386-394
-
-
King, J.1
-
33
-
-
33746389292
-
Polymophic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymophic worm detection using structural information of executables. In Rapid Advances in Intrusion Detection (RAID), 2005.
-
(2005)
Rapid Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
37
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
June
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proc. of 2005 Programming Language Design and Implementation (PLDI) conference, June 2005.
-
(2005)
Proc. of 2005 Programming Language Design and Implementation (PLDI) Conference
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
46
-
-
84882601711
-
-
r code
-
r code. ATPhttpd exploit. http://www.cotse.com/mailing-lists/todays/att- 0003/01-atphttp0x06.c.
-
ATPhttpd Exploit
-
-
-
47
-
-
33751040191
-
-
Y. Ramin. ATPhttpd.http://www.redshift.com/~yramin/atp/atphttpd/.
-
ATPhttpd
-
-
Ramin, Y.1
-
49
-
-
0031143763
-
Nstrace: A bus-driven instruction trace tool for powerpc microprocessors
-
P. A. Sandon, Y. Liao, T. Cook, D. Schultz, and P. M. de Nicolas. Nstrace: A bus-driven instruction trace tool for powerpc microprocessors. IBM Journal of Research and Development, 41(3), 1997.
-
(1997)
IBM Journal of Research and Development
, vol.41
, Issue.3
-
-
Sandon, P.A.1
Liao, Y.2
Cook, T.3
Schultz, D.4
De Nicolas, P.M.5
-
57
-
-
0020157396
-
Programmers use slices when debugging
-
M. Weiser. Programmers use slices when debugging. Communications of the ACM, 25:446-452, 1982.
-
(1982)
Communications of the ACM
, vol.25
, pp. 446-452
-
-
Weiser, M.1
|