-
3
-
-
77952398107
-
Fuzzing for software vulnerability discovery
-
Department of Mathematic, Royal Holloway, University of London
-
T. Clarke, "Fuzzing for software vulnerability discovery," Department of Mathematic, Royal Holloway, University of London, Tech. Rep. RHUL-MA-2009-4, 2009.
-
(2009)
Tech. Rep. RHUL-MA-2009-4
-
-
Clarke, T.1
-
5
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
C. Ramakrishnan and R. Sekar, "Model-based analysis of configuration vulnerabilities," Journal of Computer Security, vol. 10, pp. 189-209, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 189-209
-
-
Ramakrishnan, C.1
Sekar, R.2
-
6
-
-
67650177553
-
Quality assurance of software applications using the in vivo testing approach
-
C. Murphy, G. Kaiser, I. Vo, and M. Chu, "Quality assurance of software applications using the in vivo testing approach," in Proc. of the Second IEEE International Conference on Software Testing, Verification and Validation (ICST), 2009, pp. 111-120.
-
(2009)
Proc. of the Second IEEE International Conference on Software Testing, Verification and Validation (ICST)
, pp. 111-120
-
-
Murphy, C.1
Kaiser, G.2
Vo, I.3
Chu, M.4
-
7
-
-
17644418014
-
An anytime approach to analyzing software systems
-
D. Rubenstein, L. Osterweil, and S. Zilberstein, "An anytime approach to analyzing software systems," in Proc. of 10th FLAIRS, 1997, pp. 386-391.
-
(1997)
Proc. of 10th FLAIRS
, pp. 386-391
-
-
Rubenstein, D.1
Osterweil, L.2
Zilberstein, S.3
-
8
-
-
84978437417
-
The design and implementation of zap: A system for migrating computing environments
-
S. Osman, D. Subhraveti, G. Su, and J. Nieh, "The design and implementation of Zap: A system for migrating computing environments," in Proc of the Fifth Symposium on Operating Systems Design and Implementation (OSDI), 2002, pp. 361-376.
-
(2002)
Proc of the Fifth Symposium on operating Systems Design and Implementation (OSDI)
, pp. 361-376
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
9
-
-
61649110928
-
Dejaview: A personal virtual computer recorder
-
New York, NY, USA: ACM
-
O. Laadan, R. A. Baratto, D. B. Phung, S. Potter, and J. Nieh, "Dejaview: a personal virtual computer recorder," in SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles. New York, NY, USA: ACM, 2007, pp. 279-292.
-
(2007)
SOSP '07: Proceedings of Twenty-First ACM SIGOPS Symposium on operating Systems Principles
, pp. 279-292
-
-
Laadan, O.1
Baratto, R.A.2
Phung, D.B.3
Potter, S.4
Nieh, J.5
-
10
-
-
50649103078
-
Distributed in vivo testing of software applications
-
April
-
M. Chu, C. Murphy, and G. Kaiser, "Distributed in vivo testing of software applications," in Proc. of the First International Conference on Software Testing, Verification and Validation, April 2008, pp. 509-512.
-
(2008)
Proc. of the First International Conference on Software Testing, Verification and Validation
, pp. 509-512
-
-
Chu, M.1
Murphy, C.2
Kaiser, G.3
-
11
-
-
85180635118
-
Software self-healing using collaborative application communities
-
February
-
M. E. Locasto, S. Sidiroglou, and A.D. Keromytis, "Software self-healing using collaborative application communities," in Proc. of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (NDSS 2006), February 2006, pp. 95-106.
-
(2006)
Proc. of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (NDSS 2006)
, pp. 95-106
-
-
Locasto, M.E.1
Sidiroglou, S.2
Keromytis, A.D.3
-
14
-
-
77952373390
-
-
"Putty," http://www.chiark.greenend.org.uk/sgtatham/putty.
-
-
-
-
15
-
-
0031123369
-
Fault injection techniques and tools
-
M.-C. Hsueh, T. K. Tsai, and R. K. Iyer, "Fault injection techniques and tools," Computer, vol. 30, no. 4, pp. 75-82, 1997.
-
(1997)
Computer
, vol.30
, Issue.4
, pp. 75-82
-
-
Hsueh, M.-C.1
Tsai, T.K.2
Iyer, R.K.3
-
17
-
-
0036041314
-
Software security vulnerability testing in hostile environments
-
New York, NY, USA: ACM
-
H. H. Thompson, J. A. Whittaker, and F. E. Mottay, "Software security vulnerability testing in hostile environments," in Proceedings of the 2002 ACM symposium on Applied computing. New York, NY, USA: ACM, 2002, pp. 260-264.
-
(2002)
Proceedings of the 2002 ACM Symposium on Applied Computing
, pp. 260-264
-
-
Thompson, H.H.1
Whittaker, J.A.2
Mottay, F.E.3
-
18
-
-
77949898398
-
Taint-based directed whitebox fuzzing
-
Washington, DC, USA: IEEE Computer Society
-
V. Ganesh, T. Leek, and M. Rinard, "Taint-based directed whitebox fuzzing," in ICSE '09: Proceedings of the 2009 IEEE 31st International Conference on Software Engineering. Washington, DC, USA: IEEE Computer Society, 2009, pp. 474-484.
-
(2009)
ICSE '09: Proceedings of the 2009 IEEE 31st International Conference on Software Engineering
, pp. 474-484
-
-
Ganesh, V.1
Leek, T.2
Rinard, M.3
|