-
12
-
-
85180622665
-
-
Ida pro
-
Ida pro. http://www.hex-rays.com/idapro/.
-
-
-
-
28
-
-
0004072686
-
-
Addison-Wesley
-
A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman. Compilers: Princiles, Techniques, and Tools (Second Edition). Addison-Wesley, 2006.
-
(2006)
Compilers: Princiles, Techniques, and Tools (Second Edition)
-
-
Aho, A. V.1
Lam, M. S.2
Sethi, R.3
Ullman, J. D.4
-
29
-
-
65349145047
-
Using programmer-written compiler extensions to catch security holes
-
Oakland, California, USA, May
-
K. Ashcraft and D. Engler. Using programmer-written compiler extensions to catch security holes. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, California, USA, May, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
-
-
Ashcraft, K.1
Engler, D.2
-
32
-
-
79952020076
-
Rich: Automatically protecting against integer-based vulnerabilities
-
D. Brumley, T. cker Chiueh, R. Johnson, H. Lin, and D. Song. Rich: Automatically protecting against integer-based vulnerabilities. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’07), 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS’07)
-
-
Brumley, D.1
cker Chiueh, T.2
Johnson, R.3
Lin, H.4
Song, D.5
-
33
-
-
58449115871
-
-
Technical Report CMU-CS-07-133, Carnegie Mellon University
-
D. Brumley, C. Hartwig, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, D. Song, and H. Yin. Bitscope: Automatically dissecting malicious binaries, 2007. Technical Report CMU-CS-07-133, Carnegie Mellon University.
-
(2007)
Bitscope: Automatically dissecting malicious binaries
-
-
Brumley, D.1
Hartwig, C.2
Kang, M. G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
Yin, H.8
-
36
-
-
34547241782
-
Exe: automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. Exe: automatically generating inputs of death. In Proceedings of the 13th ACM conference on Computer and communications security (CCS’06), pages 322–335, 2006.
-
(2006)
Proceedings of the 13th ACM conference on Computer and communications security (CCS’06)
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P. M.3
Dill, D. L.4
Engler, D. R.5
-
37
-
-
78049406538
-
Using type qualifiers to analyze untrusted integers and detecting security flaws in c programs
-
E. Ceesay, J. Zhou, M. Gertz, K. Levitt, and M. Bishop. Using type qualifiers to analyze untrusted integers and detecting security flaws in c programs. In Detection of Intrusions and Malware & Vulnerability Assessment, 2006.
-
(2006)
Detection of Intrusions and Malware & Vulnerability Assessment
-
-
Ceesay, E.1
Zhou, J.2
Gertz, M.3
Levitt, K.4
Bishop, M.5
-
38
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In Proceedings of the 14th conference on USENIX Security Symposium, pages 12–12, 2005.
-
(2005)
Proceedings of the 14th conference on USENIX Security Symposium
, pp. 12-12
-
-
Chen, S.1
Xu, J.2
Sezer, E. C.3
Gauriar, P.4
Iyer, R. K.5
-
39
-
-
35048861896
-
A tool for checking ANSI-C programs
-
Springer
-
E. Clarke, D. Kroening, and F. Lerda. A tool for checking ANSI-C programs. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 2988 of Lecture Notes in Computer Science, pages 168–176. Springer, 2004.
-
(2004)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 2988 of Lecture Notes in Computer Science
, pp. 168-176
-
-
Clarke, E.1
Kroening, D.2
Lerda, F.3
-
41
-
-
0036036247
-
Flow-sensitive type qualifiers
-
Berlin, Germany
-
J. S. Foster, T. Terauchi, and A. Aiken. Flow-sensitive type qualifiers. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI’02), pages 1–12, Berlin, Germany, 2002.
-
(2002)
Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI’02)
, pp. 1-12
-
-
Foster, J. S.1
Terauchi, T.2
Aiken, A.3
-
42
-
-
67650336319
-
A decision procedure for bit-vectors and arrays
-
Berlin, Germany, July Springer-Verlag
-
V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In Computer Aided Verification (CAV’07), Berlin, Germany, July 2007. Springer-Verlag.
-
(2007)
Computer Aided Verification (CAV’07)
-
-
Ganesh, V.1
Dill, D. L.2
-
44
-
-
85128730845
-
Automated white-box fuzz testing
-
San Diego, CA, February
-
P. Godefroid, M. Levin, and D. Molnar. Automated white-box fuzz testing. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08), San Diego, CA, February 2008.
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08)
-
-
Godefroid, P.1
Levin, M.2
Molnar, D.3
-
46
-
-
53349100043
-
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
-
Anchorage, Alaska, USA, June
-
Z. Lin, X. Zhang, and D. Xu. Convicting exploitable software vulnerabilities: An efficient input provenance based approach. In Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’08), Anchorage, Alaska, USA, June 2008.
-
(2008)
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’08)
-
-
Lin, Z.1
Zhang, X.2
Xu, D.3
-
47
-
-
34250686292
-
Intermediate-representation recovery from low-level code
-
Charleston, South Carolina, USA
-
T. Reps, G. Balakrishnan, and J. Lim. Intermediate-representation recovery from low-level code. In Proceedings of the 2006 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, Charleston, South Carolina, USA, 2006.
-
(2006)
Proceedings of the 2006 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation
-
-
Reps, T.1
Balakrishnan, G.2
Lim, J.3
-
48
-
-
39049129781
-
A next-generation platform for analyzing executables
-
Tsukuba, Japan
-
T. Reps, G. Balakrishnan, J. Lim, and T. Teitelbaum. A next-generation platform for analyzing executables. In The Third Asian Symposium on Programming Languages and Systems, Tsukuba, Japan, 2005.
-
(2005)
The Third Asian Symposium on Programming Languages and Systems
-
-
Reps, T.1
Balakrishnan, G.2
Lim, J.3
Teitelbaum, T.4
-
49
-
-
56249126470
-
Flow-insensitive static analysis for detecting integer anomalies in programs
-
Anaheim, CA, USA, ACTA Press
-
D. Sarkar, M. Jagannathan, J. Thiagarajan, and R. Venkatapathy. Flow-insensitive static analysis for detecting integer anomalies in programs. In Proceedings of the 25th conference on IASTED International Multi-Conference, pages 334–340, Anaheim, CA, USA, 2007. ACTA Press.
-
(2007)
Proceedings of the 25th conference on IASTED International Multi-Conference
, pp. 334-340
-
-
Sarkar, D.1
Jagannathan, M.2
Thiagarajan, J.3
Venkatapathy, R.4
-
51
-
-
38149044194
-
A new algorithm for identifying loops in decompilation
-
Springer
-
T. Wei, J. Mao, W. Zou, and Y. Chen. A new algorithm for identifying loops in decompilation. In 14th International Static Analysis Symposium (SAS’07), volume 4634 of Lecture Notes in Computer Science, pages 170–183. Springer, 2007.
-
(2007)
14th International Static Analysis Symposium (SAS’07), volume 4634 of Lecture Notes in Computer Science
, pp. 170-183
-
-
Wei, T.1
Mao, J.2
Zou, W.3
Chen, Y.4
-
53
-
-
76549117792
-
Uqbtng: a tool capable of automatically finding integer overflows in win32 binaries
-
R. Wojtczuk. Uqbtng: a tool capable of automatically finding integer overflows in win32 binaries. In 22nd Chaos Communication Congress, 2005.
-
(2005)
22nd Chaos Communication Congress
-
-
Wojtczuk, R.1
-
54
-
-
1542317050
-
Archer: using symbolic, path-sensitive analysis to detect memory access errors
-
Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. SIGSOFT Softw. Eng. Notes, 28(5):327–336, 2003.
-
(2003)
SIGSOFT Softw. Eng. Notes
, vol.28
, Issue.5
, pp. 327-336
-
-
Xie, Y.1
Chou, A.2
Engler, D.3
|