-
3
-
-
34547241782
-
Exe: automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. Exe: automatically generating inputs of death. In ACM Conference on Computer and Communications Security, pages 322-335, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
4
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
Dec
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In OSDI, Dec. 2002.
-
(2002)
OSDI
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
5
-
-
0039334690
-
Verifying security protocols with brutus
-
E. M. Clarke, S. Jha, and W. Marrero. Verifying security protocols with brutus. ACM Trans. Softw. Eng. Methodol., 9(4):443-487, 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
6
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz. Tupni: Automatic reverse engineering of input formats. In The 15th ACM Conference on Computer and Communications Security (CCS), 2008.
-
(2008)
The 15th ACM Conference on Computer and Communications Security (CCS)
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irun-Briz, L.5
-
8
-
-
57349133785
-
Grammar-based whitebox fuzzing
-
P. Godefroid, A. Kiezun, and M. Y. Levin. Grammar-based whitebox fuzzing. In PLDI, pages 206-215, 2008.
-
(2008)
PLDI
, pp. 206-215
-
-
Godefroid, P.1
Kiezun, A.2
Levin, M.Y.3
-
9
-
-
31844450371
-
Dart: Directed automated random testing
-
New York, NY, USA, ACM
-
P. Godefroid, N. Klarlund, and K. Sen. Dart: Directed automated random testing. In PLDI'05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 213-223, New York, NY, USA, 2005. ACM.
-
(2005)
PLDI'05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
10
-
-
35448934440
-
Mace: Language support for building distributed systems
-
June
-
C. Killian, J. W. Anderson, R. Baud, R. Jhala, and A. Vahdat. Mace: Language support for building distributed systems. In PLDI, June 2007.
-
(2007)
PLDI
-
-
Killian, C.1
Anderson, J.W.2
Baud, R.3
Jhala, R.4
Vahdat, A.5
-
11
-
-
85028155431
-
Life, death, and the critical transition: Finding liveness bugs in system code
-
Apr
-
C. Killian, J. W. Anderson, R. Jhala, and A. Vahdat. Life, death, and the critical transition: Finding liveness bugs in system code. In NSDI, Apr. 2007.
-
(2007)
NSDI
-
-
Killian, C.1
Anderson, J.W.2
Jhala, R.3
Vahdat, A.4
-
12
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.7
-
-
King, J.C.1
-
13
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer-Verlag, Berlin Germany
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, Berlin Germany, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
15
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
16
-
-
0025557712
-
An empirical study of the reliability of unix utilities
-
B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of unix utilities. Commun. ACM, 33(12):32-44, 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
17
-
-
11244321232
-
CMC: A pragmatic approach to model checking real code
-
Dec
-
M. Musuvathi, D. Park, A. Chou, D. Engler, and D. Dill. CMC: A pragmatic approach to model checking real code. In OSDI, Dec. 2002.
-
(2002)
OSDI
-
-
Musuvathi, M.1
Park, D.2
Chou, A.3
Engler, D.4
Dill, D.5
-
18
-
-
0030705795
-
Proving properties of security protocols by induction
-
Washington, DC, USA, IEEE Computer Society
-
L. C. Paulson. Proving properties of security protocols by induction. In CSFW'97: Proceedings of the 10th IEEE workshop on Computer Security Foundations, page 70, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
CSFW'97: Proceedings of the 10th IEEE workshop on Computer Security Foundations
, pp. 70
-
-
Paulson, L.C.1
-
19
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP congestion control with a misbehaving receiver. Computer Communication Review, 29(5), 1999.
-
(1999)
Computer Communication Review
, vol.29
, Issue.5
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
20
-
-
0031627781
-
Efficient finite-state analysis for large security protocols
-
V. Shmatikov and U. Stern. Efficient finite-state analysis for large security protocols. In CSFW, pages 106-115, 1998.
-
(1998)
CSFW
, pp. 106-115
-
-
Shmatikov, V.1
Stern, U.2
-
21
-
-
0035701586
-
Robust congestion signaling
-
Nov
-
D. Wetherall, D. Ely, N. Spring, S. Savage, and T. Anderson. Robust congestion signaling. In ICNP, Nov. 2001.
-
(2001)
ICNP
-
-
Wetherall, D.1
Ely, D.2
Spring, N.3
Savage, S.4
Anderson, T.5
-
22
-
-
84885668018
-
Using model checking to find serious file system errors
-
J. Yang, P. Twohey, D. R. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In OSDI, pages 273-288, 2004.
-
(2004)
OSDI
, pp. 273-288
-
-
Yang, J.1
Twohey, P.2
Engler, D.R.3
Musuvathi, M.4
|