-
1
-
-
47249150568
-
Demand-driven compositional symbolic execution
-
S. Anand, P. Godefroid, and N. Tillmann, "Demand-Driven Compositional Symbolic Execution," Proc. Int'l Conf. Tools and Algorithms for the Construction and Analysis of Systems, pp. 367-381, 2008.
-
(2008)
Proc. Int'l Conf. Tools and Algorithms for the Construction and Analysis of Systems
, pp. 367-381
-
-
Anand, S.1
Godefroid, P.2
Tillmann, N.3
-
2
-
-
57449083130
-
Finding bugs in dynamic web applications
-
S. Artzi, A. Kiezun, J. Dolby, F. Tip, D. Dig, A. Paradkar, and M.D. Ernst, "Finding Bugs in Dynamic Web Applications," Proc. Int'l Symp. Software Testing and Analysis, pp. 261-272, 2008.
-
(2008)
Proc. Int'l Symp. Software Testing and Analysis
, pp. 261-272
-
-
Artzi, S.1
Kiezun, A.2
Dolby, J.3
Tip, F.4
Dig, D.5
Paradkar, A.6
Ernst, M.D.7
-
4
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song, "Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation," Proc. 16th USENIX Security Symp., 2007.
-
(2007)
Proc. 16th USENIX Security Symp.
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
5
-
-
85076893888
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D.R. Engler, "Klee: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs," Proc. USENIX Symp. Operating Systems Design and Implementation, pp. 209-224, 2008.
-
(2008)
Proc. USENIX Symp. Operating Systems Design and Implementation
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.R.3
-
7
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P.M. Pawlowski, D.L. Dill, and D.R. Engler, "EXE: Automatically Generating Inputs of Death," Proc. Conf. Computer and Comm. Security, pp. 322-335, 2006.
-
(2006)
Proc. Conf. Computer and Comm. Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
8
-
-
85008249099
-
Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
-
J. Clause and A. Orso, "Penumbra: Automatically Identifying Failure-Relevant Inputs Using Dynamic Tainting," Proc. Int'l Symp. Software Testing and Analysis, 2009.
-
(2009)
Proc. Int'l Symp. Software Testing and Analysis
-
-
Clause, J.1
Orso, A.2
-
11
-
-
57349101753
-
DySy: Dynamic symbolic execution for invariant inference
-
C. Csallner, N. Tillmann, and Y. Smaragdakis, "DySy: Dynamic Symbolic Execution for Invariant Inference," Proc. Int'l Conf. Software Eng., pp. 281-290, 2008.
-
(2008)
Proc. Int'l Conf. Software Eng.
, pp. 281-290
-
-
Csallner, C.1
Tillmann, N.2
Smaragdakis, Y.3
-
13
-
-
0032679915
-
A Deadlock detection tool for concurrent java programs
-
June
-
C. Demartini, R. Iosif, and R. Sisto, "A Deadlock Detection Tool for Concurrent Java Programs," Software-Practice and Experience, vol.29, no.7, pp. 577-603, June 1999.
-
(1999)
Software-Practice and Experience
, vol.29
, Issue.7
, pp. 577-603
-
-
Demartini, C.1
Iosif, R.2
Sisto, R.3
-
14
-
-
34548267106
-
Dynamic test input generation for database applications
-
M. Emmi, R. Majumdar, and K. Sen, "Dynamic Test Input Generation for Database Applications," Proc. Int'l Symp. Software Testing and Analysis, pp. 151-162, 2007.
-
(2007)
Proc. Int'l Symp. Software Testing and Analysis
, pp. 151-162
-
-
Emmi, M.1
Majumdar, R.2
Sen, K.3
-
16
-
-
67650067282
-
Grammar-based whitebox fuzzing
-
P. Godefroid, A. Kie-zun, and M.Y. Levin, "Grammar-Based Whitebox Fuzzing," Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation, pp. 206-215, 2008.
-
(2008)
Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation
, pp. 206-215
-
-
Godefroid, P.1
Kie-zun, A.2
Levin, M.Y.3
-
17
-
-
31844450371
-
DART: Directed automated random testing
-
P. Godefroid, N. Klarlund, and K. Sen, "DART: Directed Automated Random Testing," Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation, pp. 213-223, 2005.
-
(2005)
Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
18
-
-
85128730845
-
Automated whitebox fuzz testing
-
P. Godefroid, M.Y. Levin, and D. Molnar, "Automated Whitebox Fuzz Testing," Proc. Network Distributed Security Symp., pp. 151- 166, 2008.
-
(2008)
Proc. Network Distributed Security Symp
, pp. 151-166
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.3
-
21
-
-
84896693469
-
Model checking java programs using java path finder
-
K. Havelund and T. Pressburger, "Model Checking Java Programs Using Java PathFinder," Int'l J. Software Tools for Technology Transfer, vol.2, no.4, pp. 366-381, 2000.
-
(2000)
Int'l J. Software Tools for Technology Transfer
, vol.2
, Issue.4
, pp. 366-381
-
-
Havelund, K.1
Pressburger, T.2
-
22
-
-
18944390941
-
The model cecker SPIN
-
G.J. Holzmann, "The Model Checker SPIN," Software Eng., vol.23, no.5, pp. 279-295, 1997.
-
(1997)
Software Eng.
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
23
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai, "Web Application Security Assessment by Fault Injection and Behavior Monitoring," Proc. 12th Int'l Conf. World Wide Web, pp. 148-159, 2003.
-
(2003)
Proc. 12th Int'l Conf. World Wide Web
, pp. 148-159
-
-
Huang, Y.-W.1
Huang, S.-K.2
Lin, T.-P.3
Tsai, C.-H.4
-
24
-
-
4544358830
-
Verifying web applications using bounded model checking
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.T. Lee, and S.-Y. Ku, "Verifying Web Applications Using Bounded Model Checking," Proc. Int'l Conf. Dependable Systems and Networks, pp. 199-208, 2004.
-
(2004)
Proc. Int'l Conf. Dependable Systems and Networks
, pp. 199-208
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Ku, S.-Y.6
-
25
-
-
52249111298
-
Evacon: A framework for integrating evolutionary and concolic testing for object-oriented programs
-
K. Inkumsah and T. Xie, "Evacon: A Framework for Integrating Evolutionary and Concolic Testing for Object-Oriented Programs," Proc. IEEE/ACM Int'l Conf. Automated Software Eng., 2007.
-
(2007)
Proc. IEEE/ACM Int'l Conf. Automated Software Eng.
-
-
Inkumsah, K.1
Xie, T.2
-
26
-
-
35248897067
-
SMask: Preventing injection attacks in web applications by approximating automatic data/code separation
-
M. Johns and C. Beyerlein, "SMask: Preventing Injection Attacks in Web Applications by Approximating Automatic Data/Code Separation," Proc. ACM Symp. Applied Computing, 2007.
-
(2007)
Proc. ACM Symp. Applied Computing
-
-
Johns, M.1
Beyerlein, C.2
-
27
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities short paper
-
N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)," Proc. IEEE Symp. Security and Privacy, pp. 258-263, 2006.
-
(2006)
Proc. IEEE Symp. Security and Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
28
-
-
85008256304
-
HAMPI: A solver for string constraints
-
A. Kie-zun, V. Ganesh, P.J. Guo, P. Hooimeijer, and M.D. Ernst, "HAMPI: A Solver for String Constraints," Proc. Int'l Symp. Software Testing and Analysis, 2009.
-
(2009)
Proc. Int'l Symp. Software Testing and Analysis
-
-
Kie-zun, A.1
Ganesh, V.2
Guo, P.J.3
Hooimeijer, P.4
Ernst, M.D.5
-
29
-
-
77949879017
-
Automatic creation of sql injection and cross-site scripting attacks
-
A. Kie-zun, P. Guo, K. Jayaraman, and M. Ernst, "Automatic Creation of SQL Injection and Cross-Site Scripting Attacks," Proc. Int'l Conf. Software Eng., pp. 199-209, 2009.
-
(2009)
Proc. Int'l Conf. Software Eng.
, pp. 199-209
-
-
Kie-zun, A.1
Guo, P.2
Jayaraman, K.3
Ernst, M.4
-
30
-
-
35348845024
-
SecuriFly: Runtime protection and recovery from web application vulnerabilities
-
B. Livshits, M. Martin, and M.S. Lam, "SecuriFly: Runtime Protection and Recovery from Web Application Vulnerabilities," technical report, Stanford Univ., 2006.
-
(2006)
Technical Report, Stanford Univ
-
-
Livshits, B.1
Martin, M.2
Lam, M.S.3
-
33
-
-
56549119554
-
Leveraging user interactions for in-depth testing of web applications
-
S. McAllister, E. Kirda, and C. Kruegel, "Leveraging User Interactions for In-Depth Testing of Web Applications," Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection, pp. 191-210, 2008.
-
(2008)
Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection
, pp. 191-210
-
-
McAllister, S.1
Kirda, E.2
Kruegel, C.3
-
34
-
-
33749823368
-
Static approximation of dynamically generated web pages
-
Y. Minamide, "Static Approximation of Dynamically Generated Web Pages," Proc. Int'l Conf. World Wide Web 2005.
-
(2005)
Proc. Int'l Conf. World Wide Web
-
-
Minamide, Y.1
-
36
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans, "Automatically Hardening Web Applications Using Precise Tainting," Proc. Int'l Conf. Information Security, 2005.
-
(2005)
Proc. Int'l Conf. Information Security
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
38
-
-
33745661661
-
Defending against injection attacks through context-sensitive string evaluation
-
T. Pietraszek and C.V. Berghe, "Defending against Injection Attacks through Context-Sensitive String Evaluation," Proc. Recent Advances in Intrusion Detection, pp. 124-145, 2005.
-
(2005)
Proc. Recent Advances in Intrusion Detection
, pp. 124-145
-
-
Pietraszek, T.1
Berghe, C.V.2
-
39
-
-
32344447459
-
CUTE: A concolic unit testing engine for c
-
K. Sen, D. Marinov, and G. Agha, "CUTE: A Concolic Unit Testing Engine for C," Proc. ACM SIGSOFT Int'l Symp. Foundations of Software Eng., pp. 263-272, 2005.
-
(2005)
Proc. ACM SIGSOFT Int'l Symp. Foundations of Software Eng.
, pp. 263-272
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
40
-
-
85008253127
-
Fault localization and repair for java runtime exceptions
-
S. Sinha, H. Shah, C. Gor̈g, S. Jiang, and M. Kim, "Fault Localization and Repair for Java Runtime Exceptions," Proc. Int'l Symp. Software Testing and Analysis, 2009.
-
(2009)
Proc. Int'l Symp. Software Testing and Analysis
-
-
Sinha, S.1
Shah, H.2
Gor̈g, C.3
Jiang, S.4
Kim, M.5
-
42
-
-
34247390730
-
Test input generation for java containers using state matching
-
W. Visser, C.S. Peanu, and R. Pelánek, "Test Input Generation for Java Containers Using State Matching," Proc. Int'l Symp. Software Testing and Analysis, pp. 37-48, 2006.
-
(2006)
Proc. Int'l Symp. Software Testing and Analysis
, pp. 37-48
-
-
Visser, W.1
Peanu, C.S.2
Pelánek, R.3
-
44
-
-
57349153984
-
Static detection of cross-site scripting vulnerabilities
-
G. Wassermann and Z. Su, "Static Detection of Cross-Site Scripting Vulnerabilities," Proc. Int'l Conf. Software Eng., pp. 171- 180, 2008.
-
(2008)
Proc. Int'l Conf. Software Eng.
, pp. 171-180
-
-
Wassermann, G.1
Su, Z.2
-
45
-
-
57449103850
-
Dynamic test input generation for web applications
-
G. Wassermann, D. Yu, A. Chander, D. Dhurjati, H. Inamura, and Z. Su, "Dynamic Test Input Generation for Web Applications," Proc. ACM/SIGSOFT Int'l Symp. Software Testing and Analysis, pp. 249-260, 2008.
-
(2008)
Proc. ACM/SIGSOFT Int'l Symp. Software Testing and Analysis
, pp. 249-260
-
-
Wassermann, G.1
Yu, D.2
Chander, A.3
Dhurjati, D.4
Inamura, H.5
Su, Z.6
-
46
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Y. Xie and A. Aiken, "Static Detection of Security Vulnerabilities in Scripting Languages," Proc. Conf. USENIX Security Symp., pp. 179-192, 2006.
-
(2006)
Proc. Conf. USENIX Security Symp.
, pp. 179-192
-
-
Xie, Y.1
Aiken, A.2
|