-
5
-
-
0141943455
-
-
Technical report, MIT CSAIL
-
A. Andoni, D. Daniliuc, S. Khurshid, and D. Marinov. Evaluating the "small scope hypothesis". Technical report, MIT CSAIL, 2002.
-
(2002)
Evaluating the "Small Scope Hypothesis"
-
-
Andoni, A.1
Daniliuc, D.2
Khurshid, S.3
Marinov, D.4
-
6
-
-
33244470892
-
Improving software security with a c pointer analysis
-
May
-
D. Avots, M. Dalton, V. B. Livshits, and M. S. Lam. Improving software security with a C pointer analysis. In Proceedings of the 27th International Conference on Software Engineering (ICSE '05), pages 332-341, May 2005.
-
(2005)
Proceedings of the 27th International Conference on Software Engineering (ICSE '05)
, pp. 332-341
-
-
Avots, D.1
Dalton, M.2
Livshits, V.B.3
Lam, M.S.4
-
9
-
-
79955963313
-
Parallel symbolic execution for automated real-world software testing
-
S. Bucur, V. Ureche, C. Zamfir, and G. Candea. Parallel symbolic execution for automated real-world software testing. In Proceedings of the 6th ACM European Conference on Computer Systems (EUROSYS '11), pages 183-198, 2011.
-
(2011)
Proceedings of the 6th ACM European Conference on Computer Systems (EUROSYS '11)
, pp. 183-198
-
-
Bucur, S.1
Ureche, V.2
Zamfir, C.3
Candea, G.4
-
11
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
Oct.-Nov
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: automatically generating inputs of death. In Proceedings of the 13th ACM conference on Computer and communications security (CCS '06), pages 322-335, Oct.-Nov. 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06)
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
14
-
-
0036041421
-
An empirical study of operating systems errors
-
Nov
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), pages 73-88, Nov. 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01)
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
15
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. In Proceedings of the 13th USENIX Security Symposium, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
17
-
-
84954457203
-
Hardware verification using ansi-c programs as a reference
-
January
-
E. Clarke and D. Kroening. Hardware verification using ANSI-C programs as a reference. In Proceedings of ASP-DAC 2003, pages 308-311, January 2003.
-
(2003)
Proceedings of ASP-DAC 2003
, pp. 308-311
-
-
Clarke, E.1
Kroening, D.2
-
18
-
-
0035783967
-
Using symbolic execution for verifying safety-critical systems
-
A. Coen-Porisini, G. Denaro, C. Ghezzi, and M. Pezzé. Using symbolic execution for verifying safety-critical systems. In Proceedings of the Eighth European Software Engineering Conference held jointly with the Ninth ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE-9), pages 142-151, 2001.
-
(2001)
Proceedings of the Eighth European Software Engineering Conference Held Jointly with the Ninth ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE-9)
, pp. 142-151
-
-
Coen-Porisini, A.1
Denaro, G.2
Ghezzi, C.3
Pezzé, M.4
-
21
-
-
70450092967
-
Bouncer: Securing software by blocking bad input
-
Oct
-
M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: securing software by blocking bad input. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07), pages 117-130, Oct. 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07)
, pp. 117-130
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
23
-
-
82655162762
-
Efficient deterministic multithreading through schedule relaxation
-
Oct
-
H. Cui, J.Wu, J. Gallagher, H. Guo, and J. Yang. Efficient deterministic multithreading through schedule relaxation. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP '11), Oct. 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP '11)
-
-
Cui, H.1
Wu, J.2
Gallagher, J.3
Guo, H.4
Yang, J.5
-
24
-
-
84880093791
-
-
CVS. http://www.cvshome.org.
-
CVS
-
-
-
26
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
Sept
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI '00), Sept. 2000.
-
(2000)
Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI '00)
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
27
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Yu Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01)
-
-
Engler, D.1
Yu Chen, D.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
29
-
-
79959873939
-
Dyta: Dynamic symbolic execution guided with static verification results
-
X. Ge, K. Taneja, T. Xie, and N. Tillmann. Dyta: dynamic symbolic execution guided with static verification results. In Proceedings of the 33rd International Conference on Software Engineering, ICSE '11, pages 992-994, 2011.
-
(2011)
Proceedings of the 33rd International Conference on Software Engineering, ICSE '11
, pp. 992-994
-
-
Ge, X.1
Taneja, K.2
Xie, T.3
Tillmann, N.4
-
30
-
-
84880113606
-
-
Git. http://git-scm.com/.
-
-
-
-
31
-
-
84880102743
-
-
GNU sed. http://www.gnu.org/software/sed.
-
-
-
-
34
-
-
82655162774
-
Practical software model checking via dynamic interface reduction
-
Oct
-
H. Guo, M.Wu, L. Zhou, G. Hu, J. Yang, and L. Zhang. Practical software model checking via dynamic interface reduction. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP '11), Oct. 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP '11)
-
-
Guo, H.1
Wu, E.2
Zhou, L.3
Hu, G.4
Yang, J.5
Zhang, L.6
-
36
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI '02), 2002.
-
(2002)
Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI '02)
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
37
-
-
0036041563
-
Lazy abstraction
-
T. A. Henzinger, R. Jhala, R. Majumdar, , and G. Sutre. Lazy abstraction. In Proceedings of the 29th Annual Symposium on Principles of Programming Languages, pages pp. 58-70, 2002.
-
(2002)
Proceedings of the 29th Annual Symposium on Principles of Programming Languages
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
38
-
-
0000194670
-
Elements of style: Analyzing a software design feature with a counterexample detector
-
July
-
D. Jackson and C. A. Damon. Elements of style: Analyzing a software design feature with a counterexample detector. IEEE Trans. Softw. Eng., 22(7):484-495, July 1996.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.7
, pp. 484-495
-
-
Jackson, D.1
Damon, C.A.2
-
39
-
-
84864046845
-
Tracer: A symbolic execution tool for verification
-
July
-
J. Jaffar, V. Murali, J. A. Navas, and A. E. Santosa. Tracer: A symbolic execution tool for verification. In Proceedings of the 24th international conference on Computer aided verification, CAV'12, July 2012.
-
(2012)
Proceedings of the 24th International Conference on Computer Aided Verification, CAV'12
-
-
Jaffar, J.1
Murali, V.2
Navas, J.A.3
Santosa, A.E.4
-
41
-
-
85028155431
-
Life, death, and the critical transition: Finding liveness bugs in systems code
-
April
-
C. Killian, J. W. Anderson, R. Jhala, and A. Vahdat. Life, death, and the critical transition: Finding liveness bugs in systems code. In Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07), pages 243-256, April 2007.
-
(2007)
Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07)
, pp. 243-256
-
-
Killian, C.1
Anderson, J.W.2
Jhala, R.3
Vahdat, A.4
-
43
-
-
84863456769
-
Efficient state merging in symbolic execution
-
V. Kuznetsov, J. Kinder, S. Bucur, and G. Candea. Efficient state merging in symbolic execution. In Proceedings of the ACM SIGPLAN 2012 Conference on Programming Language Design and Implementation (PLDI '12), pages 193-204, 2012.
-
(2012)
Proceedings of the ACM SIGPLAN 2012 Conference on Programming Language Design and Implementation (PLDI '12)
, pp. 193-204
-
-
Kuznetsov, V.1
Kinder, J.2
Bucur, S.3
Candea, G.4
-
44
-
-
84942774185
-
Directed symbolic execution
-
Sept
-
K.-K. Ma, Y. P. Khoo, J. S. Foster, and M. Hicks. Directed symbolic execution. In The 18th International Static Analysis Symposium, SAS '11, Sept. 2011.
-
(2011)
The 18th International Static Analysis Symposium, SAS '11
-
-
Ma, K.-K.1
Khoo, Y.P.2
Foster, J.S.3
Hicks, M.4
-
47
-
-
79959884205
-
Directed incremental symbolic execution
-
S. Person, G. Yang, N. Rungta, and S. Khurshid. Directed incremental symbolic execution. In Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation, PLDI '11, pages 504-515, 2011.
-
(2011)
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '11
, pp. 504-515
-
-
Person, S.1
Yang, G.2
Rungta, N.3
Khurshid, S.4
-
49
-
-
80051919125
-
Symbolic execution with mixed concrete-symbolic solving
-
C. S. Pǎsǎreanu, N. Rungta, and W. Visser. Symbolic execution with mixed concrete-symbolic solving. In Proceedings of the 2011 International Symposium on Software Testing and Analysis, ISSTA '11, pages 34-44, 2011.
-
(2011)
Proceedings of the 2011 International Symposium on Software Testing and Analysis, ISSTA '11
, pp. 34-44
-
-
Pǎsǎreanu, C.S.1
Rungta, N.2
Visser, W.3
-
50
-
-
84880128920
-
-
QEMU. http://www.qemu.org.
-
-
-
-
51
-
-
51049109111
-
Unionfs: Userand community-oriented development of a unification filesystem
-
Ottawa, Canada, July
-
D. P. Quigley, J. Sipek, C. P. Wright, and E. Zadok. UnionFS: Userand Community-oriented Development of a Unification Filesystem. In Proceedings of the 2006 Linux Symposium, volume 2, pages 349-362, Ottawa, Canada, July 2006.
-
(2006)
Proceedings of the 2006 Linux Symposium
, vol.2
, pp. 349-362
-
-
Quigley, D.P.1
Sipek, J.2
Wright, C.P.3
Zadok, E.4
-
54
-
-
84880120164
-
-
shadow. http://pkg-shadow.alioth.debian.org/.
-
Shadow
-
-
-
55
-
-
84875644317
-
Eat my data: How everybody gets file io wrong
-
July
-
S. Smith. Eat my data: How everybody gets file io wrong. In OSCON 2008, July 2008.
-
(2008)
OSCON 2008
-
-
Smith, S.1
-
56
-
-
84880094042
-
-
tar
-
tar. http://www.gnu.org/software/tar/.
-
-
-
-
61
-
-
14844302134
-
Meca: An extensible, expressive system and language for statically checking security properties
-
Oct
-
J. Yang, T. Kremenek, Y. Xie, and D. Engler. MECA: an extensible, expressive system and language for statically checking security properties. In Proceedings of the 10th ACM conference on Computer and communications security (CCS '03), pages 321-334, Oct. 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
, pp. 321-334
-
-
Yang, J.1
Kremenek, T.2
Xie, Y.3
Engler, D.4
-
62
-
-
84885668018
-
Using model checking to find serious file system errors
-
Dec
-
J. Yang, P. Twohey, D. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04), pages 273-288, Dec. 2004.
-
(2004)
Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04)
, pp. 273-288
-
-
Yang, J.1
Twohey, P.2
Engler, D.3
Musuvathi, M.4
-
63
-
-
79952139838
-
Explode: A lightweight, general system for finding serious storage system errors
-
Nov
-
J. Yang, C. Sar, and D. Engler. Explode: a lightweight, general system for finding serious storage system errors. In Proceedings of the Seventh Symposium on Operating Systems Design and Implementation (OSDI '06), pages 131-146, Nov. 2006.
-
(2006)
Proceedings of the Seventh Symposium on Operating Systems Design and Implementation (OSDI '06)
, pp. 131-146
-
-
Yang, J.1
Sar, C.2
Engler, D.3
-
64
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
May
-
J. Yang, C. Sar, P. Twohey, C. Cadar, and D. Engler. Automatically generating malicious disks using symbolic execution. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (SP '06), pages 243-257, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (SP '06)
, pp. 243-257
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
-
65
-
-
85076916869
-
Modist: Transparent model checking of unmodified distributed systems
-
Apr
-
J. Yang, T. Chen, M. Wu, Z. Xu, X. Liu, H. Lin, M. Yang, F. Long, L. Zhang, and L. Zhou. MODIST: Transparent model checking of unmodified distributed systems. In Proceedings of the Sixth Symposium on Networked Systems Design and Implementation (NSDI '09), pages 213-228, Apr. 2009.
-
(2009)
Proceedings of the Sixth Symposium on Networked Systems Design and Implementation (NSDI '09)
, pp. 213-228
-
-
Yang, J.1
Chen, T.2
Wu, M.3
Xu, Z.4
Liu, X.5
Lin, H.6
Yang, M.7
Long, F.8
Zhang, L.9
Zhou, L.10
|