-
2
-
-
47249123725
-
-
PhD thesis, Computer Science Department, University ofWisconsin at Madison August
-
Balakrishnan, G.: WYSINWYX: What You See Is Not What You eXecute. PhD thesis, Computer Science Department, University ofWisconsin at Madison (August 2007)
-
(2007)
WYSINWYX: What You See Is Not What You EXecute
-
-
Balakrishnan, G.1
-
3
-
-
24644506256
-
Codesurfer/x86 - A platform for analyzing x86 executables
-
April
-
Balakrishnan, G., Gruian, R., Reps, T., Teitelbaum, T.: Codesurfer/x86 - a platform for analyzing x86 executables. In: Proceedings of the International Conference on Compiler Construction (April 2005)
-
(2005)
Proceedings of the International Conference on Compiler Construction
-
-
Balakrishnan, G.1
Gruian, R.2
Reps, T.3
Teitelbaum, T.4
-
6
-
-
79960377694
-
-
Brumley, D.: http://security.ece.cmu.edu
-
-
-
Brumley, D.1
-
9
-
-
48949099057
-
Jakstab: A static analysis platform for binaries
-
Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
-
Kinder, J., Veith, H.: Jakstab: A static analysis platform for binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 423-427. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 423-427
-
-
Kinder, J.1
Veith, H.2
-
11
-
-
84891959053
-
-
(url checked April 21, 2011)
-
Microsoft. Phoenix framework, http://research.microsoft.com/phoenix/ (url checked April 21, 2011)
-
Phoenix Framework
-
-
-
12
-
-
16244366310
-
Valgrind: A program supervision framework
-
July
-
Nethercote, N., Seward, J.: Valgrind: A program supervision framework. In: Proceedings of the Third Workshop on Runtime Verification, Boulder, Colorado, USA (July 2003)
-
(2003)
Proceedings of the Third Workshop on Runtime Verification, Boulder, Colorado, USA
-
-
Nethercote, N.1
Seward, J.2
-
14
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
May
-
Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 317-331 (May 2010)
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 317-331
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
15
-
-
77954983679
-
Directed proof generation for machine code
-
Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. Springer, Heidelberg
-
Thakur, A., Lim, J., Lal, A., Burton, A., Driscoll, E., Elder, M., Andersen, T., Reps, T.: Directed proof generation for machine code. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 288-305. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6174
, pp. 288-305
-
-
Thakur, A.1
Lim, J.2
Lal, A.3
Burton, A.4
Driscoll, E.5
Elder, M.6
Andersen, T.7
Reps, T.8
|