-
2
-
-
85164205772
-
Aeg : Automatic exploit generation
-
(Feb.
-
A vgerinos, T., Cha, S.K., Hao, B.L.T. and Brumley, D. AEG : Automatic exploit generation. In Proceedings of NDSS'11, (Feb. 2011).
-
(2011)
Proceedings of NDSS'11
-
-
A Vgerinos, T.1
Cha, S.K.2
Hao, B.L.T.3
Brumley, D.4
-
3
-
-
77954943557
-
Structural coverage of feasible code
-
B aluda, M., Braione, P., Denaro, G. and Pezzè, M. Structural coverage of feasible code. In Proceedings of AST'10.
-
Proceedings of AST
, vol.10
-
-
Baluda, M.1
Braione, P.2
Denaro, G.3
Pezzè, M.4
-
4
-
-
84863702961
-
Server-side verification of client behavior in online games
-
B ethea, D., Cochran, R. and Reiter, M. Server-side verification of client behavior in online games. In Proceedings of NDSS'10, 2010.
-
(2010)
Proceedings of NDSS
, vol.10
-
-
Bethea, D.1
Cochran, R.2
Reiter, M.3
-
5
-
-
70349693589
-
Rwset: Attacking path explosion in constraint-based test generation
-
Mar-Apr
-
B oonstoppel, P., Cadar, C. and Engler, D. RWset: Attacking path explosion in constraint-based test generation. In Proceedings of TACAS'08, (Mar-Apr 2008).
-
(2008)
Proceedings of TACAS'08
-
-
Boonstoppel, P.1
Cadar, C.2
Engler, D.3
-
6
-
-
0016674309
-
Select ;a formal system for testing and debugging programs by symbolic execution
-
B oyer, R.S., Elspas, B. and Levitt, K.N. SELECT -A formal system for testing and debugging programs by symbolic execution. SIGPLAN Not. 10 (1975), 234245.
-
(1975)
SIGPLAN Not.
, vol.10
, pp. 234-245
-
-
Boyer, R.S.1
Elspas, B.2
Levitt, K.N.3
-
7
-
-
56249135986
-
Heuristics for scalable dynamic test generation
-
Sept.
-
B urnim, J. and Sen, K. Heuristics for scalable dynamic test generation. In Proceedings of ASE'08, (Sept. 2008).
-
(2008)
Proceedings of ASE'08
-
-
Burnim, J.1
Sen, K.2
-
8
-
-
67650790221
-
Kle: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
Dec
-
C adar, C., Dunbar, D. and Engler, D. KLE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of OSDI'08, (Dec 2008).
-
(2008)
Proceedings of OSDI'08
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
9
-
-
33751059192
-
Execution generated test cases: How to make systems code crash itself (invited paper
-
Aug
-
C adar, C. and Engler, D. Execution generated test cases: How to make systems code crash itself (invited paper). In Proceedings of SPIN'05, (Aug 2005).
-
(2005)
Proceedings of SPIN'05
-
-
Cadar, C.1
Engler, D.2
-
10
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
(Oct-Nov 2006). An extended version appeared in ACM TISEC 12
-
C adar, C., Ganesh, V., Pawlowski, P., Dill, D. and Engler, D. EXE: Automatically generating inputs of death. In Proceedings of CCS'06, (Oct-Nov 2006). An extended version appeared in ACM TISEC 12, 2 (2008).
-
(2008)
Proceedings of CCS'06
, vol.2
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
11
-
-
77954604013
-
Reverse engineering of binary device drivers with revnic
-
(Apr
-
C hipounov, V. and Candea, G. Reverse engineering of binary device drivers with RevNIC. In Proceedings of EuroSys'10, (Apr 2010).
-
(2010)
Proceedings of EuroSys'10
-
-
Chipounov, V.1
Candea, G.2
-
16
-
-
80052312354
-
Satisfiability modulo theories: Introduction and applications
-
(Sept
-
D e Moura, L. and Bjørner, N. Satisfiability modulo theories: introduction and applications. Commun. ACM 54, 9 (Sept. 2011), 6977.
-
(2011)
Commun. ACM
, vol.54
, Issue.9
, pp. 69-77
-
-
De Moura, L.1
Bjørner, N.2
-
18
-
-
67650336319
-
A decision procedure for bit-vectors and arrays
-
July
-
G anesh, V. and Dill, D.L. A decision procedure for bit-vectors and arrays. In Proceedings of CAV'07, (July 2007).
-
(2007)
Proceedings of CAV'07
-
-
Ganesh, V.1
Dill, D.L.2
-
22
-
-
84873681593
-
Scalable distributed concolic testing: A case study on a flash storage platform
-
199213
-
Kim, Y., Kim, M., and Dang, N. Scalable distributed concolic testing: A case study on a flash storage platform. In Proceedings of ICTAC'10, 199213.
-
Proceedings of ICTAC'10
-
-
Kim, Y.1
Kim, M.2
Dang, N.3
-
23
-
-
0016971687
-
Symbolic execution and program testing
-
July
-
King, J.C. Symbolic execution and program testing. Commun. ACM 19, 7 (July 1976), 385394.
-
(1976)
Commun. ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
24
-
-
3042658703
-
Llvm: A compilation framework for lifelong program analysis and transformation
-
Mar
-
L attner, C. and Adve, V. LLVM: A compilation framework for lifelong program analysis and transformation. In Proceedings of CGO'04, (Mar 2004).
-
(2004)
Proceedings of CGO'04
-
-
Lattner, C.1
Adve, V.2
-
25
-
-
84863343234
-
Gkle: Concolic verification and test generation for gpus
-
L i, G., Li, P., Sawaga, G, Gopalakrishnan, G., Ghosh, I. and Rajan, S.P. GKLE: Concolic verification and test generation for GPUs. In Proceedings of PPoPP'12.
-
Proceedings of PPoPP'12
-
-
Li, G.1
Li, P.2
Sawaga, G.3
Gopalakrishnan, G.4
Ghosh, I.5
Rajan, S.P.6
-
27
-
-
47249106308
-
-
Technical Report UCB/EECS -2007-36. EECS Department, rftxt University of California, Berkeley, Mar.
-
M ajumdar, R. and Sen, K. Latest: Lazy dynamic test input generation. Technical Report UCB/EECS -2007-36. EECS Department, University of California, Berkeley, Mar. 2007.
-
(2007)
Latest: Lazy dynamic test input generation
-
-
Majumdar, R.1
Sen, K.2
-
29
-
-
78649275346
-
Analysis & detection of sql injection vulnerabilities via automatic test case generation of programs
-
(July
-
R use, M., Sarkar, T. and Basu, S. Analysis & detection of SQL injection vulnerabilities via automatic test case generation of programs. In Proceedings of SAINT'10, (July 2010).
-
(2010)
Proceedings of SAINT'10
-
-
Ruse, M.1
Sarkar, T.2
Basu, S.3
-
30
-
-
84873690964
-
Kleenet: Automatic bug hunting in sensor network applications
-
(Apr
-
S asnauskas, R., Link, J.A.B., Alizai, M.H., and Wehrle, K. Kleenet: Automatic bug hunting in sensor network applications. In Proceedings of IPSN'10, (Apr 2010).
-
(2010)
Proceedings of IPSN'10
-
-
Sasnauskas, R.1
Link, J.A.B.2
Alizai, M.H.3
Wehrle, K.4
-
32
-
-
79953083809
-
Automated systematic testing of open distributed programs
-
S en, K. and Agha, G. Automated systematic testing of open distributed programs. In Proceedings of FASE'06, 2006.
-
(2006)
Proceedings of FASE'06
-
-
Sen, K.1
Agha, G.2
-
33
-
-
84896846874
-
Cute and jcute : Concolic unit testing and explicit path model-checking tools
-
S en, K. and Agha, G. CUTE and jCUTE : Concolic unit testing and explicit path model-checking tools. In Proceedings of CAV'06.
-
Proceedings of CAV'06
-
-
Sen, K.1
Agha, G.2
-
34
-
-
57349195956
-
A race-detection and flipping algorithm for automated testing of multi-threaded programs
-
S en, K. and Agha, G. A race-detection and flipping algorithm for automated testing of multi-threaded programs. In Proceedings of HVC, (2006).
-
(2006)
Proceedings of HVC
-
-
Sen, K.1
Agha, G.2
-
36
-
-
80052977526
-
Rule-based verification of network protocol implementations using symbolic execution
-
(May
-
S ong, J., Ma, T., Cadar, C. and Pietzuch, P. Rule-based verification of network protocol implementations using symbolic execution. In Proceedings of ICCCN'11, (May 2011).
-
(2011)
Proceedings of ICCCN'11
-
-
Song, J.1
Ma, T.2
Cadar, C.3
Pietzuch, P.4
-
38
-
-
78751495155
-
Directed test suite augmentation: Techniques and trade-offs
-
(Nov.
-
Xu, Z., Kim, Y., Kim, M., Rothermel, G. and Cohen, M.B. Directed test suite augmentation: Techniques and trade-offs. In Proceedings of FSE'10, (Nov. 2010).
-
(2010)
Proceedings of FSE'10
-
-
Xu, Z.1
Kim, Y.2
Kim, M.3
Rothermel, G.4
Cohen, M.B.5
-
39
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution. In
-
(May
-
Y ang, J., Sar, C., Twohey, P., Cadar, C. and Engler, D. Automatically generating malicious disks using symbolic execution. In IEEE Symposium on Security and Privacy, (May 2006).
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
-
40
-
-
77954609085
-
Execution syn thesis: A technique for automated software debugging
-
(Apr
-
Z amfir, C. and Candea, G. Execution synthesis: A technique for automated software debugging. In Proceedings of EuroSys'10, (Apr 2010).
-
(2010)
Proceedings of EuroSys'10
-
-
Zamfir, C.1
Candea, G.2
|