-
1
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Bellardo, J.1
Savage, S.2
-
2
-
-
84863702961
-
Server-side verification of client behavior in online games
-
D. Bethea, R. Cochran, and M. K. Reiter. Server-side Verification of Client Behavior in Online Games. In NDSS, 2010.
-
(2010)
NDSS
-
-
Bethea, D.1
Cochran, R.2
Reiter, M.K.3
-
3
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
D. Brumley, P. Poosankam, D. X. Song, and J. Zheng. Automatic patch-based exploit generation is possible: Techniques and implications. In Security and Privacy, 2008.
-
(2008)
Security and Privacy
-
-
Brumley, D.1
Poosankam, P.2
Song, D.X.3
Zheng, J.4
-
4
-
-
80053044524
-
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration
-
J. Caballero, Z. Liang, P. Poosankam, and D. Song. Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration. In RAID, 2009.
-
(2009)
RAID
-
-
Caballero, J.1
Liang, Z.2
Poosankam, P.3
Song, D.4
-
5
-
-
67650790221
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008.
-
(2008)
OSDI
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
6
-
-
80053153597
-
Exe: A system for automatically generating inputs of death using symbolic execution
-
C. Cadar, P. Twohey, V. Ganesh, and D. Engler. Exe: A system for automatically generating inputs of death using symbolic execution. In CCS, 2006.
-
(2006)
CCS
-
-
Cadar, C.1
Twohey, P.2
Ganesh, V.3
Engler, D.4
-
7
-
-
70350525202
-
Inputs of coma: Static detection of denial-of-service vulnerabilities
-
R. Chang, G. Jiang, F. Ivancic, S. Sankaranarayanan, and V. Shmatikov. Inputs of coma: Static detection of denial-of-service vulnerabilities. In IEEE Computer Security Foundations Symp., 2009.
-
(2009)
IEEE Computer Security Foundations Symp.
-
-
Chang, R.1
Jiang, G.2
Ivancic, F.3
Sankaranarayanan, S.4
Shmatikov, V.5
-
8
-
-
76749150920
-
Netcomplex: A complexity metric for networked system designs
-
B.-G. Chun, S. Ratnasamy, and E. Kohler. Netcomplex: A complexity metric for networked system designs. In NSDI, 2008.
-
(2008)
NSDI
-
-
Chun, B.-G.1
Ratnasamy, S.2
Kohler, E.3
-
11
-
-
0035701586
-
Robust congestion signaling
-
D. Ely, N. Spring, D. Wetherall, S. Savage, and T. Anderson. Robust congestion signaling. In ICNP, 2001.
-
(2001)
ICNP
-
-
Ely, D.1
Spring, N.2
Wetherall, D.3
Savage, S.4
Anderson, T.5
-
12
-
-
0036036098
-
Extended static checking for Java
-
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata. Extended static checking for Java. In PLDI, 2002.
-
(2002)
PLDI
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
13
-
-
31844450371
-
DART: Directed automated random testing
-
P. Godefroid, N. Klarlund, and K. Sen. DART: directed automated random testing. In PLDI, 2005.
-
(2005)
PLDI
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
14
-
-
85028155431
-
Life, death, and the critical transition: Finding liveness bugs in systems code
-
C. E. Killian, J. W. Anderson, R. Jhala, and A. Vahdat. Life, death, and the critical transition: Finding liveness bugs in systems code. In NSDI, 2007.
-
(2007)
NSDI
-
-
Killian, C.E.1
Anderson, J.W.2
Jhala, R.3
Vahdat, A.4
-
15
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
-
(1976)
Commun ACM
, vol.19
, Issue.7
-
-
King, J.C.1
-
16
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. SIGCOMM CCR, 32(3), 2002.
-
(2002)
SIGCOMM CCR
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
18
-
-
10844221463
-
Model checking large network protocol implementations
-
M. Musuvathi and D. R. Engler. Model checking large network protocol implementations. In NSDI, 2004.
-
(2004)
NSDI
-
-
Musuvathi, M.1
Engler, D.R.2
-
19
-
-
4444293708
-
CMC: A programatic approach to model checking real code
-
M. Musuvathi, D. Y. W. Park, A. Chou, D. R. Engler, and D. L. Dill. CMC: A programatic approach to model checking real code. In OSDI, 2002.
-
(2002)
OSDI
-
-
Musuvathi, M.1
Park, D.Y.W.2
Chou, A.3
Engler, D.R.4
Dill, D.L.5
-
20
-
-
34548307187
-
Using channel hopping to increase 802.11 resilience to jamming attacks
-
V. Navda, A. Bohra, and S. Ganguly. Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE Infocom Mini Symp., 2007.
-
(2007)
IEEE Infocom Mini Symp.
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
-
21
-
-
1542355459
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
G. C. Necula, S. McPeak, S. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In CCC, 2002.
-
(2002)
CCC
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.3
Weimer, W.4
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
24
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP congestion control with a misbehaving receiver. SIGCOMM CCR, 29(5), 1999.
-
(1999)
SIGCOMM CCR
, vol.29
, Issue.5
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
25
-
-
0003792238
-
Stream control transmission protocol
-
Stream control transmission protocol. IETF RFC 2960, 2000.
-
(2000)
IETF RFC 2960
-
-
-
27
-
-
80053152039
-
Security attacks found against the stream control transmission protocol (SCTP) and current countermeasures
-
Security attacks found against the stream control transmission protocol (SCTP) and current countermeasures. IETF RFC 5062, 2007.
-
(2007)
IETF RFC 5062
-
-
-
30
-
-
43149111827
-
Pex: White box test generation for .NET
-
Tests and Proofs
-
N. Tillmann and J. de Halleux. Pex: White box test generation for .NET. In Tests and Proofs, LNCS. 2008.
-
(2008)
LNCS
-
-
Tillmann, N.1
De Halleux, J.2
-
31
-
-
85076880480
-
Crystalball: Predicting and preventing inconsistencies in deployed distributed systems
-
M. Yabandeh, N. Knezevic, D. Kostic, and V. Kuncak. Crystalball: predicting and preventing inconsistencies in deployed distributed systems. In NSDI, 2009.
-
(2009)
NSDI
-
-
Yabandeh, M.1
Knezevic, N.2
Kostic, D.3
Kuncak, V.4
|