-
5
-
-
33745956039
-
-
BHANSALI, S., CHEN, W.-K., DE JONG, S., EDWARDS, A., MURRAY, R., DRINIC, M., MIHOCKA, D., AND CHAU, J. Framework for instruction-level tracing and analysis of program executuions. In VEE (June 2006).
-
BHANSALI, S., CHEN, W.-K., DE JONG, S., EDWARDS, A., MURRAY, R., DRINIC, M., MIHOCKA, D., AND CHAU, J. Framework for instruction-level tracing and analysis of program executuions. In VEE (June 2006).
-
-
-
-
6
-
-
42549093311
-
-
BROADWELL, P., HARREN, M., AND SASTRY, N. Scrash: a system, for generating secure crash information.
-
Scrash: A system, for generating secure crash information
-
-
BROADWELL, P.1
HARREN, M.2
SASTRY, N.3
-
7
-
-
33751056900
-
Towards automatic generation of vulnerability signatures
-
May
-
BRUMLEY, D., NEWSOME, J., SONG, D., WANG, H., AND JHA, S. Towards automatic generation of vulnerability signatures. In IEEE Symposium on Security and Privacy (May 2006).
-
(2006)
IEEE Symposium on Security and Privacy
-
-
BRUMLEY, D.1
NEWSOME, J.2
SONG, D.3
WANG, H.4
JHA, S.5
-
8
-
-
34547241782
-
Automatically Generating Inputs of Death
-
CADAR, C., GANESH, V., PAWLOWSKI, P. M., DILL, D. L., AND ENGLER, D. R. EXE: Automatically Generating Inputs of Death. In 13th ACM Confeience on Computer and Communications Security (2006).
-
(2006)
13th ACM Confeience on Computer and Communications Security
-
-
CADAR, C.1
GANESH, V.2
PAWLOWSKI, P.M.3
DILL, D.L.4
ENGLER, D.R.E.5
-
9
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
Nov
-
CASTRO, M., COSTA, M., AND HARRIS, T. Securing software by enforcing data-flow integrity. In OSDI (Nov. 2006).
-
(2006)
OSDI
-
-
CASTRO, M.1
COSTA, M.2
HARRIS, T.3
-
10
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
July
-
CHEN, S., XU, J., SEZER, E. C., GAURIAR, P., AND IYER, R. K. Non-control-data attacks are realistic threats. In USENIX Security Symposium (July 2005).
-
(2005)
USENIX Security Symposium
-
-
CHEN, S.1
XU, J.2
SEZER, E.C.3
GAURIAR, P.4
IYER, R.K.5
-
11
-
-
42549153052
-
Measuring privacy loss in statistical databases
-
June
-
CHIRAYATH, V., LONGPRE, L., AND KREINOVICH, V. Measuring privacy loss in statistical databases. In Workshop on Descriptional Complexity of Formal Systems (June 2006), pp. 16-25.
-
(2006)
Workshop on Descriptional Complexity of Formal Systems
, pp. 16-25
-
-
CHIRAYATH, V.1
LONGPRE, L.2
KREINOVICH, V.3
-
12
-
-
70450092967
-
Bouncer: Securing Software by Blocking Bad Input
-
Oct
-
COSTA, M., CASTRO, M., ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: Securing Software by Blocking Bad Input. In SOSP (Oct. 2007).
-
(2007)
SOSP
-
-
COSTA, M.1
CASTRO, M.2
ZHOU, L.3
ZHANG, L.4
PEINADO, M.5
-
13
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
Oct
-
COSTA, M., CROWCROFT, J., CASTRO, M., ROWSTRON, A., ZHOU, L., ZHANG, L., AND BARHAM, P. Vigilante: End-to-End Containment of Internet Worms. In SOSP (Oct. 2005).
-
(2005)
SOSP
-
-
COSTA, M.1
CROWCROFT, J.2
CASTRO, M.3
ROWSTRON, A.4
ZHOU, L.5
ZHANG, L.6
BARHAM, P.7
-
14
-
-
85084160243
-
Stackguard: Automatic detection and prevention of buffer-overrun attacks
-
Jan
-
COWAN, C., PU, C., MAIER, D., HINTON, H., WADPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAOLE, P., AND ZHANG, Q. Stackguard: Automatic detection and prevention of buffer-overrun attacks. In USENIX Security Symposium (Jan. 1998).
-
(1998)
USENIX Security Symposium
-
-
COWAN, C.1
PU, C.2
MAIER, D.3
HINTON, H.4
WADPOLE, J.5
BAKKE, P.6
BEATTIE, S.7
GRIER, A.8
WAOLE, P.9
ZHANG, Q.10
-
15
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
Nov
-
CRANDALL, J. R., SU, Z., WU, S. F., AND CHONG, F. T. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In ACM CCS (Nov. 2005).
-
(2005)
ACM CCS
-
-
CRANDALL, J.R.1
SU, Z.2
WU, S.F.3
CHONG, F.T.4
-
16
-
-
42549117820
-
-
DE MOURA, L., AND BJORNER, N. Z3: An Efficient SMT Solver. In. Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) (Apr. 2008).
-
DE MOURA, L., AND BJORNER, N. Z3: An Efficient SMT Solver. In. Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) (Apr. 2008).
-
-
-
-
17
-
-
42549163043
-
-
DUTERTRE, B., AND DE MOURA, L. The YICES SMT Solver. http://yices.csl.sri.com..
-
DUTERTRE, B., AND DE MOURA, L. The YICES SMT Solver. http://yices.csl.sri.com..
-
-
-
-
18
-
-
42549112771
-
-
DUTERTRE, B., AND DE MOURA, L. A fast linear-arithemic solver for dpll(t). In CAV06 (Aug. 2006).
-
DUTERTRE, B., AND DE MOURA, L. A fast linear-arithemic solver for dpll(t). In CAV06 (Aug. 2006).
-
-
-
-
19
-
-
0042078549
-
A survey of rollback-recovery protocols in message-passing systems
-
Sept
-
E.LNOZAHY, E. N., ALVISI, L., WANG, Y-M., AND JOHNSON, D. B. A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys 34, 3 (Sept. 2002), 375-408.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.3
, pp. 375-408
-
-
E.LNOZAHY, E.N.1
ALVISI, L.2
WANG, Y.-M.3
JOHNSON, D.B.4
-
20
-
-
31844450371
-
-
GODEFROID, P., KLARLUND, N., AND SEN, K. DART: Directed Automated Random Testing. In PLDI (2005).
-
GODEFROID, P., KLARLUND, N., AND SEN, K. DART: Directed Automated Random Testing. In PLDI (2005).
-
-
-
-
21
-
-
42549085865
-
Automated whitebox fuzz testing. Tech. Rep. MSR-TR-2007-58
-
May
-
GODEFROID, P., LEVIN, M. Y., AND MOLNAR, D. Automated whitebox fuzz testing. Tech. Rep. MSR-TR-2007-58, Microsoft Research Technical Report, May 2007.
-
(2007)
Microsoft Research Technical Report
-
-
GODEFROID, P.1
LEVIN, M.Y.2
MOLNAR, D.3
-
22
-
-
84880852942
-
From sampling to model counting
-
GOMES, C P., HOFFMANN, J., SABHARWAL, A., AND SELMAN, B. From sampling to model counting. In IJCAI (2007), pp. 2293-2299.
-
(2007)
IJCAI
, pp. 2293-2299
-
-
GOMES, C.P.1
HOFFMANN, J.2
SABHARWAL, A.3
SELMAN, B.4
-
23
-
-
36348974238
-
Model counting: A new strategy for obtaining good bounds
-
GOMES, C P., SABHARWAL, A., AND SELMAN, B. Model counting: A new strategy for obtaining good bounds. In AAAI (2006).
-
(2006)
AAAI
-
-
GOMES, C.P.1
SABHARWAL, A.2
SELMAN, B.3
-
24
-
-
42549095314
-
Upper and lower bounds on the number of solutions
-
Tech. Rep. MSR-TR-2007-164, Dec
-
MARTIN, J.-P. Upper and lower bounds on the number of solutions. Tech. Rep. MSR-TR-2007-164, Dec. 2007.
-
(2007)
-
-
MARTIN, J.-P.1
-
25
-
-
42549089400
-
-
MICROSOFTCORPORATION
-
MICROSOFTCORPORATION. Msnmessenger, http://messenger.msn.com.
-
Msnmessenger
-
-
-
27
-
-
84869345344
-
Description of the end user privacy policy in application error reporting when you are using office
-
MICROSOFT CORPORATION, Jan
-
MICROSOFT CORPORATION. Description of the end user privacy policy in application error reporting when you are using office. Microsoft Knowledge Base Q283768, Jan. 2007. http://support.microsoft.com/kb/ 283768.
-
(2007)
Microsoft Knowledge Base
, vol.Q283768
-
-
-
28
-
-
42549148171
-
-
MICROSOFT CORPORATION, Jan. 2007
-
MICROSOFT CORPORATION. Dr. watson overview, Jan. 2007. http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/ drwatson_overview.mspx?mfr=true.
-
Dr. watson overview
-
-
-
30
-
-
0742276097
-
Inside the Slammer worm
-
July
-
MOORE, D., PAXSON, V., SAVAGE, S., SHANNON, C., STANIFORD, S., AND WEAVER, N. Inside the Slammer worm. IEEE Security and Privacy 1, 4 (July 2003).
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 4
-
-
MOORE, D.1
PAXSON, V.2
SAVAGE, S.3
SHANNON, C.4
STANIFORD, S.5
WEAVER, N.6
-
31
-
-
84885578759
-
Treating bugs as allergies - a safe method to survive software failures
-
Nov
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: Treating bugs as allergies - a safe method to survive software failures. In SOSP (Nov. 2005).
-
(2005)
SOSP
-
-
QIN, F.1
TUCEK, J.2
SUNDARESAN, J.3
ZHOU, Y.R.4
-
32
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
Feb
-
RUWASE, O., AND LAM, M. A practical dynamic buffer overflow detector. In NDSS (Feb. 2004).
-
(2004)
NDSS
-
-
RUWASE, O.1
LAM, M.2
-
34
-
-
26444512653
-
-
SANG, T., BEAME, P., AND KAUTZ, H. A. Heuristics for fast exact model counting. In. SAT (2005), pp. 226-240.
-
SANG, T., BEAME, P., AND KAUTZ, H. A. Heuristics for fast exact model counting. In. SAT (2005), pp. 226-240.
-
-
-
-
35
-
-
32344447459
-
CUTE: A Concolic Unit Testing Engine for C
-
SEN, K., MARINOV, D., AND AGHA, G. CUTE: A Concolic Unit Testing Engine for C. In ESEC/FSE (2005).
-
(2005)
ESEC/FSE
-
-
SEN, K.1
MARINOV, D.2
AGHA, G.3
-
36
-
-
1542593224
-
A mathematical theory of communication
-
SHANNON, C E. A mathematical theory of communication. SIGMOBILE Mob. Comput. Commun. Rev. 5, 1 (2001), 3-55.
-
(2001)
SIGMOBILE Mob. Comput. Commun. Rev
, vol.5
, Issue.1
, pp. 3-55
-
-
SHANNON, C.E.1
-
38
-
-
50649093917
-
Triage: Diagnosing production run failures at the user's site
-
Nov
-
TUCEK, J., LU, S., HUANO, C., XANTHOS, S., AND ZHOU, Y. Triage: diagnosing production run failures at the user's site. In SOSP (Nov. 2007).
-
(2007)
SOSP
-
-
TUCEK, J.1
LU, S.2
HUANO, C.3
XANTHOS, S.4
ZHOU, Y.5
-
39
-
-
0036472476
-
Simplifying and isolating failure-inducing input
-
ZELLER, A., AND HILDEBRANDT, R. Simplifying and isolating failure-inducing input. IEEE Trans. Software Eng. 28, 2 (2002), 183-200.
-
(2002)
IEEE Trans. Software Eng
, vol.28
, Issue.2
, pp. 183-200
-
-
ZELLER, A.1
HILDEBRANDT, R.2
|