-
1
-
-
34547241782
-
-
C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler. Exe: automatically generating inputs of death. In CCS, 2006.
-
C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler. Exe: automatically generating inputs of death. In CCS, 2006.
-
-
-
-
2
-
-
0037702242
-
-
N. Dor, M. Rodeh, and S. Sagiv. CSSV: towards a realistic tool for statically detecting all buffer overflows in C. In PLDI, 2003.
-
N. Dor, M. Rodeh, and S. Sagiv. CSSV: towards a realistic tool for statically detecting all buffer overflows in C. In PLDI, 2003.
-
-
-
-
4
-
-
57449097718
-
-
V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In CAV, 2007.
-
V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In CAV, 2007.
-
-
-
-
5
-
-
34548273557
-
Compositional dynamic test generation
-
P. Godefroid. Compositional dynamic test generation. In POPL, 2007.
-
(2007)
POPL
-
-
Godefroid, P.1
-
6
-
-
31844450371
-
Dart: Directed automated random testing
-
P. Godefroid, N. Klarlund, and K. Sen. Dart: directed automated random testing. In PLDI, 2005.
-
(2005)
PLDI
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
7
-
-
57349144927
-
Active property checking
-
Technical report, Microsoft, 2007
-
P. Godefroid, M. Y. Levin, and D. Molnar. Active property checking. Technical report, Microsoft, 2007.
-
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.3
-
9
-
-
34548791741
-
Randomized differential testing as a prelude to formal verification
-
A. Groce, G. J. Holzmann, and R. Joshi. Randomized differential testing as a prelude to formal verification. In ICSE, 2007.
-
(2007)
ICSE
-
-
Groce, A.1
Holzmann, G.J.2
Joshi, R.3
-
11
-
-
37849012644
-
-
P. Joshi, K. Sen, and M. Shlimovich. Predictive testing: amplifying the effectiveness of software testing. In FSE, 2007.
-
P. Joshi, K. Sen, and M. Shlimovich. Predictive testing: amplifying the effectiveness of software testing. In FSE, 2007.
-
-
-
-
12
-
-
0242337515
-
The Art of Computer Programming
-
Addison-Wesley
-
D. Knuth. The Art of Computer Programming, Volume 3: Sorting and Searching. Addison-Wesley, 1997.
-
(1997)
Sorting and Searching
, vol.3
-
-
Knuth, D.1
-
13
-
-
85077733517
-
High coverage detection of input-related security faults
-
E. Larson and T. Austin. High coverage detection of input-related security faults. In USENIX, 2003.
-
(2003)
USENIX
-
-
Larson, E.1
Austin, T.2
-
14
-
-
57149133059
-
-
R. Majumdar and R. Xu. Directed test generation with symbolic grammars. In ASE, 2007.
-
R. Majumdar and R. Xu. Directed test generation with symbolic grammars. In ASE, 2007.
-
-
-
-
15
-
-
35448955692
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI, 2007.
-
(2007)
PLDI
-
-
Nethercote, N.1
Seward, J.2
-
16
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, 2004.
-
(2004)
NDSS
-
-
Ruwase, O.1
Lam, M.2
-
17
-
-
32344447459
-
CUTE: A concolic unit testing engine for C
-
K. Sen, D. Marinov, and G. Agha. CUTE: a concolic unit testing engine for C. In FSE, 2005.
-
(2005)
In FSE
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
18
-
-
77953988297
-
Using Valgrind to detect undefined value errors with bit-precision
-
J. Seward and N. Nethercote. Using Valgrind to detect undefined value errors with bit-precision. In USENIX, 2005.
-
(2005)
USENIX
-
-
Seward, J.1
Nethercote, N.2
-
19
-
-
0022093855
-
Self-adjusting binary search trees
-
D. Sleator and R. Tarjan. Self-adjusting binary search trees. J. ACM, 32(3):652-686, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.3
, pp. 652-686
-
-
Sleator, D.1
Tarjan, R.2
-
20
-
-
34247390730
-
Test input generation for Java containers using state matching
-
W. Visser, C. S. Pasareanu, and R. Pelánek. Test input generation for Java containers using state matching. In ISSTA, 2006.
-
(2006)
ISSTA
-
-
Visser, W.1
Pasareanu, C.S.2
Pelánek, R.3
-
21
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In NDSS, 2000.
-
(2000)
NDSS
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
22
-
-
1542317050
-
-
Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. In FSE, 2003.
-
Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. In FSE, 2003.
-
-
-
-
24
-
-
20344363200
-
-
M. Zitser, R. Lippmann, and T. Leek. Testing static analysis tools using exploitable buffer overflows from open source code. In FSE, 2004.
-
M. Zitser, R. Lippmann, and T. Leek. Testing static analysis tools using exploitable buffer overflows from open source code. In FSE, 2004.
-
-
-
|