-
2
-
-
77949877700
-
-
Gnome and freedesktop enviroments. http: //en.wikipedia.org/wiki/ Freedesktop.org.
-
Gnome and freedesktop
-
-
-
3
-
-
77949879845
-
-
Wikipedia entry on fuzzing
-
Wikipedia entry on fuzzing. http://en.wikipedia.org/wiki/Fuzz-testing.
-
-
-
-
5
-
-
47249130414
-
Rwset: Attacking path explosion in constraint-based test generation
-
P. Boonstoppel, C. Cadar, and D. R. Engler. Rwset: Attacking path explosion in constraint-based test generation. In TACAS, pages 351-366, 2008.
-
(2008)
TACAS
, pp. 351-366
-
-
Boonstoppel, P.1
Cadar, C.2
Engler, D.R.3
-
6
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
New York, NY, USA, ACM
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 317-329, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 317-329
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
7
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
October-November
-
C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler. EXE: Automatically generating inputs of death. In Proceedings of the 13th ACM Conference on Computer and Communications Security, October-November 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
9
-
-
67650067282
-
Grammar-based whitebox fuzzing
-
P. Godefroid, A. Kiezun, and M. Y. Levin. Grammar-based whitebox fuzzing. In PLDI, pages 206-215, 2008.
-
(2008)
PLDI
, pp. 206-215
-
-
Godefroid, P.1
Kiezun, A.2
Levin, M.Y.3
-
10
-
-
31844450371
-
Dart: Directed automated random testing
-
New York, NY, USA, ACM
-
P. Godefroid, N. Klarlund, and K. Sen. Dart: directed automated random testing. In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pages 213-223, New York, NY, USA, 2005. ACM.
-
(2005)
PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
12
-
-
33847125360
-
A functional method for assessing protocol implementation security
-
Technical Report 448, VTT Electronics, 2001
-
R. Kaksonen. A functional method for assessing protocol implementation security. Technical Report 448, VTT Electronics, 2001.
-
-
-
Kaksonen, R.1
-
13
-
-
85077733517
-
High coverage detection of input-related security facults
-
Berkeley, CA, USA, USENIX Association
-
E. Larson and T. Austin. High coverage detection of input-related security facults. In SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium, pages 9-9, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium
, pp. 9-9
-
-
Larson, E.1
Austin, T.2
-
14
-
-
52649153312
-
Coverage maximization using dynamic taint tracing
-
Technical Report TR-1112, MIT Lincoln Laboratory
-
T. Leek, G. Baker, R. Brown, M. Zhivich, and R. Lippmann. Coverage maximization using dynamic taint tracing. Technical Report TR-1112, MIT Lincoln Laboratory, 2007.
-
(2007)
-
-
Leek, T.1
Baker, G.2
Brown, R.3
Zhivich, M.4
Lippmann, R.5
-
17
-
-
0025557712
-
An empirical study of the reliability of unix utilities
-
B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of unix utilities. Commun. ACM, 33(12):32-44, 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
18
-
-
77949876745
-
-
D. Molnar and D. Wagner. Catchconv: Symbolic execution and run-time type inference for integer conversion errors. Technical Report UCB/EECS-2007-23, University of California, Berkeley, CA, Feb 2007.
-
D. Molnar and D. Wagner. Catchconv: Symbolic execution and run-time type inference for integer conversion errors. Technical Report UCB/EECS-2007-23, University of California, Berkeley, CA, Feb 2007.
-
-
-
-
19
-
-
27544444280
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on comnodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on comnodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
20
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In IFIP Security, 2005.
-
(2005)
IFIP Security
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
22
-
-
32344447459
-
Cute: A concolic unit testing engine for c
-
K. Sen, D. Marinov, and G. Agha. Cute: a concolic unit testing engine for c. SIGSOFT Softw. Eng. Notes, 30(5):263-272, 2005.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.5
, pp. 263-272
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
|