-
1
-
-
33645597073
-
The advantages of block-based protocol analysis for security testing
-
Immunity, Inc.
-
Dave Aitel. The advantages of block-based protocol analysis for security testing. Technical report, Immunity, Inc., 2002.
-
(2002)
Technical Report
-
-
Aitel, D.1
-
2
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
Juan Caballero, Heng Yin, Zhenkai Liang, and Dawn Xiaodong Song. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In CCS, pages 317-329, 2007.
-
(2007)
CCS
, pp. 317-329
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.X.4
-
3
-
-
35449005800
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum. Shredding your garbage: reducing data lifetime through secure deallocation. In Security, pages 22-22, 2005.
-
(2005)
Security
, pp. 22-22
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
4
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
James Clause, Wanchun Li, and Ro Orso. Dytan: A generic dynamic taint analysis framework. In ISSTA, pages 196-206, 2007.
-
(2007)
ISSTA
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, R.3
-
5
-
-
85008249099
-
Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
-
James A. Clause and Alessandro Orso. Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. In ISSTA, pages 249-260, 2009.
-
(2009)
ISSTA
, pp. 249-260
-
-
Clause, J.A.1
Orso, A.2
-
6
-
-
70350402293
-
Prospex: Protocol specification extraction
-
Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, and Engin Kirda. Prospex: Protocol specification extraction. In IEEE Symposiivm on Security and Privacy, pages 110-125, 2009.
-
(2009)
IEEE Symposiivm on Security and Privacy
, pp. 110-125
-
-
Comparetti, P.M.1
Wondracek, G.2
Krügel, C.3
Kirda, E.4
-
7
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, and Luis Irún-Briz. Tupni: automatic reverse engineering of input formats. In CCS, 2008.
-
(2008)
CCS
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irún-Briz, L.5
-
8
-
-
85084164001
-
Flayer: Exposing application internals
-
Will Drewry and Tavis Ormandy. Flayer: exposing application internals. In WOOT, pages 1-9, 2007.
-
(2007)
WOOT
, pp. 1-9
-
-
Drewry, W.1
Ormandy, T.2
-
9
-
-
77949898398
-
Taint-based directed whitebox fuzzing
-
Vijay Ganesh, Tim Leek, and Martin Rinard. Taint-based directed whitebox fuzzing. In ICSE, 2009.
-
(2009)
ICSE
-
-
Ganesh, V.1
Leek, T.2
Rinard, M.3
-
10
-
-
77749344007
-
Using code perforation to improve performance, reduce energy consumption, and respond to failures
-
MIT, September
-
Henry Hoffmann, Sasa Misailovic, Stelios Sidiroglou Anant Agarwal, and Martin Rinard. Using Code Perforation to Improve Performance, Reduce Energy Consumption, and Respond to Failures. Technical Report MIT-CSAIL-TR-2009-042, MIT, September 2009.
-
(2009)
Technical Report MIT-CSAIL-TR-2009-042
-
-
Hoffmann, H.1
Misailovic, S.2
Sidiroglou, S.3
Agarwal, A.4
Rinard, M.5
-
11
-
-
3042658703
-
LLVM: A compilation framework for lifelong program analysis & transformation
-
Chris Lattner and Vikram S. Adve. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO, pages 75-88, 2004.
-
(2004)
CGO
, pp. 75-88
-
-
Lattner, C.1
Adve, V.S.2
-
12
-
-
74049090626
-
Automatic protocol format reverse engineering through context-aware monitored execution
-
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, and Xiangyu Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In NDSS, 2008.
-
(2008)
NDSS
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
13
-
-
0025557712
-
An empirical study of the reliability of unix utilities
-
Barton P. Miller, Louis Fredriksen, and Bryan So. An empirical study of the reliability of unix utilities. CACM, 33(12):32-44, 1990.
-
(1990)
CACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
16
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
James Newsome and Dawn Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
17
-
-
42149128799
-
Detecting and eliminating memory leaks using cyclic memory allocation
-
Huu Hai Nguyen and Martin C. Rinard. Detecting and eliminating memory leaks using cyclic memory allocation. In ISMM, pages 15-30, 2007.
-
(2007)
ISMM
, pp. 15-30
-
-
Nguyen, H.H.1
Rinard, M.C.2
-
18
-
-
34548785574
-
Feedback-directed random test generation
-
Carlos Pacheco, Shuvendu K. Lahiri, Michael D. Ernst, and Thomas Ball. Feedback-directed random test generation. In ICSE, pages 75-84, 2007.
-
(2007)
ICSE
, pp. 75-84
-
-
Pacheco, C.1
Lahiri, S.K.2
Ernst, M.D.3
Ball, T.4
-
19
-
-
77952162164
-
Samurai: Protecting critical data in unsafe languages
-
Karthik Pattabiraman, Vinod Grover, and Benjamin G. Zorn. Samurai: protecting critical data in unsafe languages. In EuroSys, pages 219-232, 2008.
-
(2008)
EuroSys
, pp. 219-232
-
-
Pattabiraman, K.1
Grover, V.2
Zorn, B.G.3
-
20
-
-
72249104274
-
Automatically patching errors in deployed software
-
Jeff H. Perkins, Sunghun Kim, Samuel Larsen, Saman P. Amarasinghe, Jonathan Bachrach, Michael Carbin, Carlos Pacheco, Frank Sherwood, Stelios Sidiroglou, Greg Sullivan, Weng-Fai Wong, Yoav Zibin, Michael D. Ernst, and Martin C. Rinard. Automatically patching errors in deployed software. In SOSP, pages 87-102, 2009.
-
(2009)
SOSP
, pp. 87-102
-
-
Perkins, J.H.1
Kim, S.2
Larsen, S.3
Amarasinghe, S.P.4
Bachrach, J.5
Carbin, M.6
Pacheco, C.7
Sherwood, F.8
Sidiroglou, S.9
Sullivan, G.10
Wong, W.-F.11
Zibin, Y.12
Ernst, M.D.13
Rinard, M.C.14
-
21
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
-
(2006)
MICRO
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Wu, Y.6
-
22
-
-
34547435244
-
Probabilistic accuracy bounds for fault-tolerant computations that discard tasks
-
Martin C. Rinard. Probabilistic accuracy bounds for fault-tolerant computations that discard tasks. In ICS, pages 324-334, 2006.
-
(2006)
ICS
, pp. 324-334
-
-
Rinard, M.C.1
-
23
-
-
42149154819
-
Living in the comfort zone
-
Martin C. Rinard. Living in the comfort zone. In OOPSLA, pages 611-622, 2007.
-
(2007)
OOPSLA
, pp. 611-622
-
-
Rinard, M.C.1
-
24
-
-
42149175943
-
Using early phase termination to eliminate load imbalances at barrier synchronization points
-
Martin C. Rinard. Using early phase termination to eliminate load imbalances at barrier synchronization points. In OOPSLA, pages 369-386, 2007.
-
(2007)
OOPSLA
, pp. 369-386
-
-
Rinard, M.C.1
-
25
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303-316, 2004.
-
(2004)
OSDI
, pp. 303-316
-
-
Rinard, M.C.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee, W.S.6
-
27
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, pages 85-96, 2004.
-
(2004)
ASPLOS
, pp. 85-96
-
-
Edward Suh, G.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
|