-
2
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
Montreal, Quebec, Canada, Aug.
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In Proceedings of the 16th USENIX Security Symposium, pages 213-228, Montreal, Quebec, Canada, Aug. 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 213-228
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
4
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
San Diego, California, USA,Mar.
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium, pages 391-408, San Diego, California, USA,Mar. 2010.
-
(2010)
NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium
, pp. 391-408
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
5
-
-
76649114637
-
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration
-
RAID'09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Saint-Malo, France, Sept.
-
J. Caballero, Z. Liang, P. Poosankam, and D. Song. Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration. In RAID'09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, volume 5758 of Lecture Notes in Computer Science, Saint-Malo, France, Sept. 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5758
-
-
Caballero, J.1
Liang, Z.2
Poosankam, P.3
Song, D.4
-
6
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
-
Chicago, Illinois, USA, Nov.
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 621-634, Chicago, Illinois, USA, Nov. 2009.
-
(2009)
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 621-634
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
7
-
-
26944472789
-
Execution generated test cases: How to make systems code crash itself
-
SPIN'05: Proceedings of the 12th International SPIN Workshop on Model Checking Software, San Francisco, California, USA, Aug.
-
C. Cadar and D. R. Engler. Execution generated test cases: How to make systems code crash itself. In SPIN'05: Proceedings of the 12th International SPIN Workshop on Model Checking Software, volume 3639 of Lecture Notes in Computer Science, pages 2-23, San Francisco, California, USA, Aug. 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3639
, pp. 2-23
-
-
Cadar, C.1
Engler, D.R.2
-
8
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
DIMVA'08: Proceedings of the Fifth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Paris, France, July
-
L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for malware analysis and containment. In DIMVA'08: Proceedings of the Fifth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, volume 5137 of Lecture Notes inComputer Science, pages 143-163, Paris, France, July 2008.
-
(2008)
Lecture Notes InComputer Science
, vol.5137
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
12
-
-
38049098390
-
Inversion attacks on secure hash functions using SAT solvers
-
SAT'07: Proceedings of the Tenth International Conference on Theory and Applications of Satisfiability Testing, Lisbon, Portugal
-
D. De, A. Kumarasubramanian, and R. Venkatesan. Inversion attacks on secure hash functions using SAT solvers. In SAT'07: Proceedings of the Tenth International Conference on Theory and Applications of Satisfiability Testing, volume 4501 of Lecture Notes in Computer Science, pages 377-382, Lisbon, Portugal, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4501
, pp. 377-382
-
-
De, D.1
Kumarasubramanian, A.2
Venkatesan, R.3
-
13
-
-
77956141182
-
A case study in ethical decision making regarding remote mitigation of botnets
-
Tenerife, Canary Islands, Spain, Jan.
-
D. Dittrich, F. Leder, and T. Werner. A case study in ethical decision making regarding remote mitigation of botnets. In WECSR'10: Workshop on Ethics in Computer Security Research, Lecture Notes in Computer Science, Tenerife, Canary Islands, Spain, Jan. 2010.
-
(2010)
WECSR'10: Workshop on Ethics in Computer Security Research, Lecture Notes in Computer Science
-
-
Dittrich, D.1
Leder, F.2
Werner, T.3
-
16
-
-
38149088089
-
A decision procedure for bit-vectors and arrays
-
CAV'07: Proceedings of the 19th International Conference on Computer Aided Verification, Berlin, Germany, July
-
V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In CAV'07: Proceedings of the 19th International Conference on Computer Aided Verification, volume 4590 of Lecture Notes in Computer Science, pages 519-531, Berlin, Germany, July 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4590
, pp. 519-531
-
-
Ganesh, V.1
Dill, D.L.2
-
17
-
-
77949898398
-
Taint-based directed whitebox fuzzing
-
Vancouver, British Columbia, Canada, May
-
V. Ganesh, T. Leek, and M. C. Rinard. Taint-based directed whitebox fuzzing. In ICSE'09: Proceedings of the 31st International Conference on Software Engineering, pages 474-484, Vancouver, British Columbia, Canada, May 2009.
-
(2009)
ICSE'09: Proceedings of the 31st International Conference on Software Engineering
, pp. 474-484
-
-
Ganesh, V.1
Leek, T.2
Rinard, M.C.3
-
19
-
-
57349133785
-
Grammar-based whitebox fuzzing
-
Tucson, Arizona, USA, June
-
P. Godefroid, A. Kie?zun, and M. Y. Levin. Grammar-based whitebox fuzzing. In PLDI'08: Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, pages 206-215, Tucson, Arizona, USA, June 2008.
-
(2008)
PLDI'08: Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation
, pp. 206-215
-
-
Godefroid, P.1
Kiezun, A.2
Levin, M.Y.3
-
20
-
-
31844450371
-
DART: Directed automated random testing
-
Chicago, Illinois, USA, June
-
P. Godefroid, N. Klarlund, and K. Sen. DART: directed automated random testing. In PLDI'05: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 213-223, Chicago, Illinois, USA, June 2005.
-
(2005)
PLDI'05: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
21
-
-
54249151981
-
Automated whitebox fuzz testing
-
San Diego, California, USA, Feb.
-
P. Godefroid, M. Y. Levin, and D. A. Molnar. Automated whitebox fuzz testing. In NDSS'08: Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA, Feb. 2008.
-
(2008)
NDSS'08: Proceedings of the Network and Distributed System Security Symposium
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.A.3
-
23
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
Vancouver, British Columbia, Canada, May
-
A. Kie?zun, P. J. Guo, K. Jayaraman, and M. D. Ernst. Automatic creation of SQL injection and cross-site scripting attacks. In ICSE'09: Proceedings of the 31st International Conference on Software Engineering, pages 199-209, Vancouver, British Columbia, Canada, May 2009.
-
(2009)
ICSE'09: Proceedings of the 31st International Conference on Software Engineering
, pp. 199-209
-
-
Kiezun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
24
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
25
-
-
77955195701
-
Inspector Gadget: Automated extraction of proprietary gadgets from malware binaries
-
Oakland, California, USA, May
-
C. Kolbitsch, T. Holz, C. Kruegel, and E. Kirda. Inspector Gadget: Automated extraction of proprietary gadgets from malware binaries. In SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2010.
-
(2010)
SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
26
-
-
78650034031
-
Monster botnet held 800,000 people's details
-
Mar.
-
J. Leyden. Monster botnet held 800,000 people's details. The Register, Mar. 2010. http://www.theregister.co.uk/2010/03/04/mariposa-police-hunt-more- botherders/.
-
(2010)
The Register
-
-
Leyden, J.1
-
28
-
-
57349180506
-
Quantitative information flow as network flow capacity
-
Tucson, Arizona, USA, June
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI'08: Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, pages 193-205, Tucson, Arizona, USA, June 2008.
-
(2008)
PLDI'08: Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation
, pp. 193-205
-
-
McCamant, S.1
Ernst, M.D.2
-
30
-
-
0025557712
-
An empirical study of the reliability of unix utilities
-
B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of unix utilities. Communications of the ACM, 33(12):32-44, 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
31
-
-
84893320590
-
Dynamic test generation to find integer bugs in x86 binary Linux programs
-
Montreal, Quebec, Canada, Aug.
-
D. Molnar, X. C. Li, and D. Wagner. Dynamic test generation to find integer bugs in x86 binary Linux programs. In Proceedings of the 18th USENIX Security Symposium, pages 67-81, Montreal, Quebec, Canada, Aug. 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 67-81
-
-
Molnar, D.1
Li, X.C.2
Wagner, D.3
-
39
-
-
84988815150
-
-
The National Academies Press, Washington, DC, USA
-
W. A. Owens, K. W. Dam, and H. S. Lin, editors. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. The National Academies Press, Washington, DC, USA, 2009.
-
(2009)
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
-
-
Owens, W.A.1
Dam, K.W.2
Lin, H.S.3
-
40
-
-
78650001233
-
Shmoo-fu: Hacker goo, goofs, and gear with the shmoo
-
Las Vegas, Nevada, USA, July
-
B. Potter, Beetle, CowboyM, D. Moniz, R. Thayer, 3ricj, and Pablos. Shmoo-fu: Hacker goo, goofs, and gear with the shmoo. In DEFCON, Las Vegas, Nevada, USA, July 2005. http://www.defcon.org/images/defcon-13/dc13- presentations/dc-13-beetle-shmoo-fu.pdf.
-
(2005)
DEFCON
-
-
Potter, B.1
Cowboym, B.2
Moniz, D.3
Thayer, R.4
Pablos5
-
41
-
-
78650021055
-
-
Shadowserver foundation. http://www.shadowserver.org/.
-
-
-
-
42
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis (keynote invited paper)
-
ICISS'08: Proceedings of the 4th International Conference on Information Systems Security, Hyderabad, India, Dec.
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis (keynote invited paper). In ICISS'08: Proceedings of the 4th International Conference on Information Systems Security, volume 5352 of Lecture Notes in Computer Science, pages 1-25, Hyderabad, India, Dec. 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5352
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
43
-
-
77955183968
-
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
-
Oakland, California, USA, May
-
T. Wang, T. Wei, G. Gu, and W. Zou. TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2010.
-
(2010)
SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy
-
-
Wang, T.1
Wei, T.2
Gu, G.3
Zou, W.4
-
44
-
-
70350399651
-
ReFormat: Automatic reverse engineering of encrypted messages
-
ESORICS'09: 14th European Symposium on Research in Computer Security, Saint-Malo, France, Sept.
-
Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. ReFormat: Automatic reverse engineering of encrypted messages. In ESORICS'09: 14th European Symposium on Research in Computer Security, volume 5789 of Lecture Notes in Computer Science, pages 200-215, Saint-Malo, France, Sept. 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5789
, pp. 200-215
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
Grace, M.5
-
45
-
-
17044371129
-
Scalable error detection using Boolean satisfiability
-
Long Beach, California, USA, Jan.
-
Y. Xie and A. Aiken. Scalable error detection using Boolean satisfiability. In POPL'05: Proceedings of the 32nd ACMSIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 351-363, Long Beach, California, USA, Jan. 2005.
-
(2005)
POPL'05: Proceedings of the 32nd ACMSIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 351-363
-
-
Xie, Y.1
Aiken, A.2
-
46
-
-
78649983597
-
-
The zlib library. http://www.zlib.net/.
-
-
-
|