-
1
-
-
53349176525
-
-
http://www.dwheeler.com/flawfinder/
-
-
-
-
2
-
-
53349173130
-
-
http://www.fortifysoftware.com/security-resources/rats.jsp
-
-
-
-
3
-
-
53349152894
-
-
http://diablo.elis.ugent.be
-
-
-
-
4
-
-
53349173129
-
-
Buddy, a binary decision diagram package. Department of Information Technology, Technical Univ. of Denmark
-
Buddy, a binary decision diagram package. Department of Information Technology, Technical Univ. of Denmark.
-
-
-
-
6
-
-
35448955692
-
-
Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. N. Nethercote and J. Seward. In Proc. of ACMPLDI, June 2007.
-
Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. N. Nethercote and J. Seward. In Proc. of ACMPLDI, June 2007.
-
-
-
-
7
-
-
0025557712
-
-
B.P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM 33, 12, Dec. 1990.
-
B.P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM 33, 12, Dec. 1990.
-
-
-
-
9
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
Nov
-
C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler. Exe: automatically generating inputs of death. In Proc. of ACM CCS, Nov. 2006.
-
(2006)
Proc. of ACM CCS
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
11
-
-
33745254726
-
-
P. Godefroid, N. Klarlund, and K. Sen. Dart: Directed automated random testing. In Proc. of ACM PLDI, 2005.
-
P. Godefroid, N. Klarlund, and K. Sen. Dart: Directed automated random testing. In Proc. of ACM PLDI, 2005.
-
-
-
-
13
-
-
85128730845
-
Automated whitebox fuzz testing
-
San Deigo, CA, Feb
-
P. Godefroid, M. Levin, and D. Moinar. Automated whitebox fuzz testing. In Proc. of NDSS, San Deigo, CA, Feb. 2008.
-
(2008)
Proc. of NDSS
-
-
Godefroid, P.1
Levin, M.2
Moinar, D.3
-
14
-
-
84903607772
-
Dynamic Spyware Analysis
-
Santa Clara, CA, June
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic Spyware Analysis. In Proc. of the 2007 USENIX Annual Technical Conference, Santa Clara, CA, June 2007.
-
(2007)
Proc. of the 2007 USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
15
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software.. In Proc. of NDSS, Feb. 2005.
-
(2005)
Proc. of NDSS
-
-
Newsome, J.1
Song, D.2
-
16
-
-
33646767376
-
Control-Flow Integrity: Principles, Implementations, and Applications
-
Nov
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In Proc of ACM CCS, Nov. 2005.
-
(2005)
Proc of ACM CCS
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
17
-
-
84991997276
-
Securing Software by Enforcing Data-flow Integrity
-
Nov
-
M. Castro, M. Costa, and T. Harris. Securing Software by Enforcing Data-flow Integrity. In Proc. of OSDI, Nov. 2006.
-
(2006)
Proc. of OSDI
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
18
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Feb
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proc. of NDSS, Feb. 2000.
-
(2000)
Proc. of NDSS
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
19
-
-
85084164558
-
Statically Detecting Likely Buffer Overflow Vulnerabilities
-
D. Larochelle and D. Evans. Statically Detecting Likely Buffer Overflow Vulnerabilities. In Proc. of USENIX Security, 2001.
-
(2001)
Proc. of USENIX Security
-
-
Larochelle, D.1
Evans, D.2
-
20
-
-
85088735010
-
Testing Static Analysis Tools Using Exploitable Buffer Overflows From Open Source Code
-
M. Zitser, D. Shaw, T. Leek and R. Lippman. Testing Static Analysis Tools Using Exploitable Buffer Overflows From Open Source Code. In Proc. of ACM ESEC/FSE-11, 2004.
-
(2004)
Proc. of ACM ESEC/FSE-11
-
-
Zitser, M.1
Shaw, D.2
Leek, T.3
Lippman, R.4
-
21
-
-
77954524963
-
Archer: Using symbolic, path-sensitive analysis to detect memory access errors
-
Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. In Proc. of ACM ESEC/FSE-10, 2003.
-
(2003)
Proc. of ACM ESEC/FSE-10
-
-
Xie, Y.1
Chou, A.2
Engler, D.3
-
24
-
-
4544331311
-
Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams
-
X. Zhang, R. Gupta, and Y. Zhang. Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams. In Proc. of ICSE, 2004.
-
(2004)
Proc. of ICSE
-
-
Zhang, X.1
Gupta, R.2
Zhang, Y.3
|