-
1
-
-
47249130414
-
RWset: Attacking path explosion in constraint-based test generation
-
Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. Springer, Heidelberg
-
Boonstoppel, P., Cadar, C., Engler, D.: RWset: Attacking path explosion in constraint-based test generation. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 351-366. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4963
, pp. 351-366
-
-
Boonstoppel, P.1
Cadar, C.2
Engler, D.3
-
2
-
-
58449115871
-
-
Technical report cs-07-133, School of Computer Science, Carnegie Mellon University March
-
Brumley, D., Hartwig, C., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin., H.: Bitscope: Automatically dissecting malicious binaries. Technical report cs-07-133, School of Computer Science, Carnegie Mellon University (March 2007)
-
(2007)
Bitscope: Automatically Dissecting Malicious Binaries
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
Yin, H.8
-
3
-
-
78650021383
-
Automatically identifying trigger-based behavior in malware
-
Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Poosankam, J., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Botnet Analysis in Defense, vol. 36 (2007)
-
(2007)
Botnet Analysis in Defense
, vol.36
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Poosankam, J.5
Song, D.6
Yin, H.7
-
4
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the 2006 IEEE Symposimu on Security and Privacy (2006)
-
Proceedings of the 2006 IEEE Symposimu on Security and Privacy (2006)
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
5
-
-
35048885595
-
Creating vulnerability signature using weakest preconditions
-
Brumley, D., Wang, H., Jha, S., Song, D.: Creating vulnerability signature using weakest preconditions. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (2007)
-
Proceedings of the 2007 IEEE Symposium on Security and Privacy (2007)
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
6
-
-
80053044524
-
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration
-
Caballero, J., Liang, Z., Poosankam, P., Song, D.: Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration. In: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (2009)
-
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (2009)
-
-
Caballero, J.1
Liang, Z.2
Poosankam, P.3
Song, D.4
-
7
-
-
70449675218
-
-
Tech. rep., Technical Report UCB/EECS-2009-36, EECS Department, University of California, Berkeley March
-
Caballero, J., McCamant, S., Barth, A., Song, D.: Extracting models of security-sensitive operations using string-enhanced white-box exploration on binaries. Tech. rep., Technical Report UCB/EECS-2009-36, EECS Department, University of California, Berkeley (March 2009)
-
(2009)
Extracting Models of Security-sensitive Operations Using String-enhanced White-box Exploration on Binaries
-
-
Caballero, J.1
McCamant, S.2
Barth, A.3
Song, D.4
-
8
-
-
85076893888
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
Cadar, C., Dunbar, D., Engler, D.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 2008 USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008 (2008)
-
(2008)
Proceedings of the 2008 USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
10
-
-
34547241782
-
EXE:automatically generating inputs of death
-
Cadar, C., Ganesh, V., Pawlowski, P., Dill, D., Engler, D.: EXE:automatically generating inputs of death. In: Proceedings of the 2006 ACM Conference on Computer and Communications Security (CCS 2006) (2006)
-
(2006)
Proceedings of the 2006 ACM Conference on Computer and Communications Security (CCS 2006)
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
11
-
-
0004046658
-
-
Technical report 148, Department of Computer Sciences, The University of Auckland
-
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report 148, Department of Computer Sciences, The University of Auckland (1997)
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
12
-
-
77955199408
-
Identifying dormant functionality in malware programs
-
Comparetti, P.M., Salvaneschi, G., Kirda, E., Kolbitsch, C., Kruegel, C., Zanero, S.: Identifying dormant functionality in malware programs. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy (2010)
-
Proceedings of the 2010 IEEE Symposium on Security and Privacy (2010)
-
-
Comparetti, P.M.1
Salvaneschi, G.2
Kirda, E.3
Kolbitsch, C.4
Kruegel, C.5
Zanero, S.6
-
14
-
-
70450092967
-
Bouncer: Securing software by blocking bad input
-
Costa, M., Castro, M., Zhou, L., Zhang, L., Peinado, M.: Bouncer: Securing software by blocking bad input. In: Proceedings of the 2007 ACM Symposium on Operating Systems Principles (SOSP) (2007)
-
Proceedings of the 2007 ACM Symposium on Operating Systems Principles (SOSP) (2007)
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
16
-
-
85165861995
-
-
Ferrie, P.: W32.Mydoom (2004), http://www.symantec.com/security-response/ writeup.jsp?docid=2004-012612-5422-99&tabid=2
-
(2004)
W32.Mydoom
-
-
Ferrie, P.1
-
17
-
-
57049171932
-
BinHunt: Automatically finding semantic differences in binary programs
-
Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. Springer, Heidelberg
-
Gao, D., Reiter, M.K., Song, D.: BinHunt: Automatically finding semantic differences in binary programs. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 238-255. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5308
, pp. 238-255
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
21
-
-
0016971687
-
Symbolic execution and program testing
-
King, J.C.: Symbolic execution and program testing. Commun. ACM 19, 385-394 (1976), http://doi.acm.org/10.1145/360248.360252
-
(1976)
Commun. ACM
, vol.19
, pp. 385-394
-
-
King, J.C.1
-
22
-
-
85165864249
-
-
Knowles, D., Perriott, F.: W32.Blaster (2003), http://www.symantec.com/ security-response/writeup.jsp?docid=2003-081113-0229-99&tabid=2
-
(2003)
W32.Blaster
-
-
Knowles, D.1
Perriott, F.2
-
23
-
-
0002747273
-
The 3x+1 problem and its generations
-
Lagarias, J.C.: The 3x+1 problem and its generations. Amer. Math. Monthly 92, 3-23 (1985)
-
(1985)
Amer. Math. Monthly
, vol.92
, pp. 3-23
-
-
Lagarias, J.C.1
-
24
-
-
77954531697
-
BinOb+: A framework for potent and stealthy binary obfuscation
-
Lee, B., Kim, Y., Kim, J.: binOb+: a framework for potent and stealthy binary obfuscation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (2010)
-
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (2010)
-
-
Lee, B.1
Kim, Y.2
Kim, J.3
-
25
-
-
15344341623
-
Using symbolic execution to guide test generation
-
Lee, G., Morris, J., Parker, K., Bundell, G., Lam, P.: Using symbolic execution to guide test generation. Software Testing, Verification & Reliability 15(1), 41-61 (2005)
-
(2005)
Software Testing, Verification & Reliability
, vol.15
, Issue.1
, pp. 41-61
-
-
Lee, G.1
Morris, J.2
Parker, K.3
Bundell, G.4
Lam, P.5
-
30
-
-
34547349153
-
Replayer: Automatic protocol replay by binary analysis
-
Newsome, J., Brumley, D., Franklin, J., Song, D.: Replayer: Automatic protocol replay by binary analysis. In: Proceedings of the 13th ACM Conference on Computer and and Communications Security (CCS 2006) (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and and Communications Security (CCS 2006)
-
-
Newsome, J.1
Brumley, D.2
Franklin, J.3
Song, D.4
-
32
-
-
85008263148
-
Loop-extended symbolic execution on binary programs
-
Saxena, P., Poosankam, P., McCamant, S., Song, D.: Loop-extended symbolic execution on binary programs. In: Proceedings of the 18th International Symposium on Software Testing and Analysis (2009)
-
Proceedings of the 18th International Symposium on Software Testing and Analysis (2009)
-
-
Saxena, P.1
Poosankam, P.2
McCamant, S.3
Song, D.4
-
34
-
-
32344447459
-
CUTE: A concolic unit testing engine for c
-
Sen, K., Marinov, D., Agha, G.: CUTE: A concolic unit testing engine for c. In: Proceedings of 13th International Symposium on the Foundations of Software Engineering, FSE 2005 (2005)
-
(2005)
Proceedings of 13th International Symposium on the Foundations of Software Engineering, FSE 2005
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
35
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
Sharif, M., Lanzi, A., Giffin, J., Lee, W.: Impeding malware analysis using conditional code obfuscation. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (2008)
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008)
-
-
Sharif, M.1
Lanzi, A.2
Giffin, J.3
Lee, W.4
-
36
-
-
85165837952
-
-
Shinotsuka, H.: W32.NetSky (2004), http://www.symantec.com/security- response/writeup.jsp?docid=2004-030717-4718-99&tabid=2
-
(2004)
W32.NetSky
-
-
Shinotsuka, H.1
-
37
-
-
85165835637
-
-
Tech. rep., Electronics, Telecommunications, and Informatics Department, University of Aveiro November
-
Silva, T.O.: Computational verification of the 3x+1 conjecture. Tech. rep., Electronics, Telecommunications, and Informatics Department, University of Aveiro (November 2010), http://www.ieeta.pt/~tos/3x+1.html
-
(2010)
Computational Verification of the 3x+1 Conjecture
-
-
Silva, T.O.1
-
38
-
-
81355161883
-
Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
-
Wang, T., Wei, T., Lin, Z., Zou, W.: Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009) (2009)
-
(2009)
Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009)
-
-
Wang, T.1
Wei, T.2
Lin, Z.3
Zou, W.4
|