-
2
-
-
84882738624
-
-
QEMU. http://www.qemu.org.
-
QEMU
-
-
-
3
-
-
84882756833
-
-
Tribal flood network. http://www.cert.org/incident_notes/IN-99-07.html.
-
Tribal Flood Network
-
-
-
4
-
-
58449115871
-
-
Technical Report CMU-CS-07-133
-
David Brumley, Cody Hartwig, Min Gyang Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Dawn Song, and Heng Yin. Automatically dissecting malicious binaries. Technical Report CMU-CS-07-133, 2007.
-
(2007)
Automatically Dissecting Malicious Binaries
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
Yin, H.8
-
5
-
-
35048903951
-
-
Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science
-
David Brumley and James Newsome. Alias analysis for assembly. Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science, 2006.
-
(2006)
Alias Analysis For Assembly
-
-
Brumley, D.1
Newsome, J.2
-
6
-
-
50249118032
-
EXE: A system for automatically generating inputs of death using symbolic execution
-
CCS), October
-
Cristian Cadar, Vijay Ganesh, Peter Pawlowski, David Dill, and Dawson Engler. EXE: A system for automatically generating inputs of death using symbolic execution. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), October 2006.
-
Proceedings of the 13th ACM Conference On Computer and Communications Security
, pp. 2006
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
7
-
-
35048861896
-
A tool for checking ANSI-C programs
-
Kurt Jensen and Andreas Podelski, editors, of Lecture Notes in Computer Science, Springer
-
Edmund Clarke, Daniel Kroening, and Flavio Lerda. A tool for checking ANSI-C programs. In Kurt Jensen and Andreas Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), volume 2988 of Lecture Notes in Computer Science, pages 168-176. Springer, 2004.
-
(2004)
Tools and Algorithms For the Construction and Analysis of Systems (TACAS 2004)
, vol.2988
, pp. 168-176
-
-
Clarke, E.1
Kroening, D.2
Lerda, F.3
-
8
-
-
34547478273
-
Temporal search: Detecting hidden malware time bombs with virtual machines
-
ASPLOS XII), October
-
Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, S. Felix Wu, and Frederic T. Chong. Temporal search: Detecting hidden malware time bombs with virtual machines. In Proceedings of the Twelfth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XII), October 2006.
-
Proceedings of the Twelfth International Conference On Architectural Support For Programming Languages and Operating Systems
, pp. 2006
-
-
Crandall, J.R.1
Wassermann, G.2
de Oliveira, D.A.S.3
Zhendong, S.4
Wu, S.F.5
Chong, F.T.6
-
9
-
-
84882779388
-
-
Tony Lee Peter Ferrie. Win32.Netsky.C. http://www.symantec.com/security_response/writeup.jsp?docid=2004-022417%-4628-99.
-
Win32.Netsky.C
-
-
Ferrie, T.L.P.1
-
11
-
-
0036036098
-
Estended static checking for java
-
Cormac Flanagan, K. Rustan M. Leino, Mark Lillibridge, Greg Nelson, James B. Saxe, and Raymie Stata. Estended static checking for java. In ACM Conference on the Programming Language Design and Implementation (PLDI), 2002.
-
(2002)
ACM Conference On the Programming Language Design and Implementation (PLDI)
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
13
-
-
84882745155
-
-
Gettis. W32.Mydoom.B@mm. http://www.symantec.com/security_response/writeup.jsp?docid=2004-022011%-2447-99.
-
W32.Mydoom.B@mm
-
-
-
15
-
-
78249237743
-
-
Ha. Keylogger.Stawin. http://www.symantec.com/security_response/writeup.jsp?docid=2004-012915%-2315-99.
-
Keylogger.Stawin
-
-
-
16
-
-
84882809430
-
-
. Neal Hindocha. Win32.Netsky.D. http://www.symantec.com/security_response/writeup.jsp?docid=2004-030110%-0232-99.
-
Win32.Netsky.D
-
-
Hindocha, N.1
-
17
-
-
0016971687
-
Symbolic execution and program testing
-
James King. Symbolic execution and program testing. Communications of the ACM, 19:386-394, 1976.
-
(1976)
Communications of the ACM
, vol.19
, pp. 386-394
-
-
King, J.1
-
18
-
-
78249252524
-
-
McAfee
-
McAfee. W97M/Opey.C. http://vil.nai.com/vil/content/v_10290.htm.
-
W97M/Opey.C
-
-
-
20
-
-
34547349153
-
Automatic protocol replay by binary analysis
-
CCS), October
-
James Newsome, David Brumley, Jason Franklin, and Dawn Song. Replayer: Automatic protocol replay by binary analysis. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), October 2006.
-
Proceedings of the 13th ACM Conference On Computer and Communications Security
, pp. 2006
-
-
Newsome, J.1
Brumley, D.2
Franklin, J.3
Replayer, D.S.4
-
23
-
-
84882760061
-
-
Symantec. Spyware.e2give. http://www.symantec.com/securityresponse/writeup.jsp?docid=2004-102614-1006-99.
-
Symantec. Spyware.e2give
-
-
-
24
-
-
84882764319
-
-
Symantec. Xeram.1664. http://www.symantec.com/security_response/writeup.jsp?docid=2000-121913-2839-99.
-
Symantec. Xeram.1664
-
-
-
29
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, and Dawson Engler. Automatically generating malicious disks using symbolic execution. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium On Security and Privacy
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
|