메뉴 건너뛰기




Volumn 6806 LNCS, Issue , 2011, Pages 463-469

BAP: A binary analysis platform

Author keywords

[No Author keywords available]

Indexed keywords

BINARY ANALYSIS; INTERMEDIATE LANGUAGES; PROGRAM VERIFICATION; SIDE EFFECT; VERIFICATION CONDITION;

EID: 79960356314     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22110-1_37     Document Type: Conference Paper
Times cited : (328)

References (15)
  • 2
    • 47249123725 scopus 로고    scopus 로고
    • PhD thesis, Computer Science Department, University ofWisconsin at Madison August
    • Balakrishnan, G.: WYSINWYX: What You See Is Not What You eXecute. PhD thesis, Computer Science Department, University ofWisconsin at Madison (August 2007)
    • (2007) WYSINWYX: What You See Is Not What You EXecute
    • Balakrishnan, G.1
  • 6
    • 79960377694 scopus 로고    scopus 로고
    • Brumley, D.: http://security.ece.cmu.edu
    • Brumley, D.1
  • 9
    • 48949099057 scopus 로고    scopus 로고
    • Jakstab: A static analysis platform for binaries
    • Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
    • Kinder, J., Veith, H.: Jakstab: A static analysis platform for binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 423-427. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5123 , pp. 423-427
    • Kinder, J.1    Veith, H.2
  • 11
    • 84891959053 scopus 로고    scopus 로고
    • (url checked April 21, 2011)
    • Microsoft. Phoenix framework, http://research.microsoft.com/phoenix/ (url checked April 21, 2011)
    • Phoenix Framework
  • 14
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
    • May
    • Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 317-331 (May 2010)
    • (2010) Proceedings of the IEEE Symposium on Security and Privacy , pp. 317-331
    • Schwartz, E.J.1    Avgerinos, T.2    Brumley, D.3
  • 15
    • 77954983679 scopus 로고    scopus 로고
    • Directed proof generation for machine code
    • Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. Springer, Heidelberg
    • Thakur, A., Lim, J., Lal, A., Burton, A., Driscoll, E., Elder, M., Andersen, T., Reps, T.: Directed proof generation for machine code. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 288-305. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6174 , pp. 288-305
    • Thakur, A.1    Lim, J.2    Lal, A.3    Burton, A.4    Driscoll, E.5    Elder, M.6    Andersen, T.7    Reps, T.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.