-
1
-
-
84890107028
-
Here's my cert, so trust me, maybe? Understanding TLS errors on the Web
-
D. Akhawe, B. Amann, M. Vallentin, and R. Sommer. Here's my cert, so trust me, maybe? Understanding TLS errors on the Web. In WWW, 2013.
-
(2013)
WWW
-
-
Akhawe, D.1
Amann, B.2
Vallentin, M.3
Sommer, R.4
-
2
-
-
85002862540
-
Alice in warningland: A largescale field study of browser security warning effectiveness
-
D. Akhawe and A. Felt. Alice in Warningland: A largescale field study of browser security warning effectiveness. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Akhawe, D.1
Felt, A.2
-
3
-
-
84881252956
-
Lucky thirteen: Breaking the TLS and DTLS record protocols
-
N. AlFardan and K. Paterson. Lucky thirteen: Breaking the TLS and DTLS record protocols. In S&P, 2013.
-
(2013)
S&P
-
-
Alfardan, N.1
Paterson, K.2
-
4
-
-
84893210324
-
No attack necessary: The surprising dynamics of SSL trust relationships
-
B. Amann, R. Sommer, M. Vallentin, and S. Hall. No attack necessary: The surprising dynamics of SSL trust relationships. In ACSAC, 2013.
-
(2013)
ACSAC
-
-
Amann, B.1
Sommer, R.2
Vallentin, M.3
Hall, S.4
-
5
-
-
84914111464
-
Vulnerable me: Measuring systemic weaknesses in mobile browser security
-
C. Amrutkar, K. Singh, A. Verma, and P. Traynor. Vulnerable Me: Measuring systemic weaknesses in mobile browser security. In ICISS, 2012.
-
(2012)
ICISS
-
-
Amrutkar, C.1
Singh, K.2
Verma, A.3
Traynor, P.4
-
7
-
-
84880168690
-
An orchestrated survey of methodologies for automated software test case generation
-
S. Anand, E. Burke, T. Chen, J. Clark, M. Cohen, W. Grieskamp, M. Harman, M. Harrold, and P. McMinn. An orchestrated survey of methodologies for automated software test case generation. Journal of Systems and Software, 86(8):1978-2001, 2013.
-
(2013)
Journal of Systems and Software
, vol.86
, Issue.8
, pp. 1978-2001
-
-
Anand, S.1
Burke, E.2
Chen, T.3
Clark, J.4
Cohen, M.5
Grieskamp, W.6
Harman, M.7
Harrold, M.8
McMinn, P.9
-
8
-
-
1842514147
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In CRYPTO, 1996.
-
(1996)
CRYPTO
-
-
Bleichenbacher, D.1
-
10
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
11
-
-
67650790221
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008.
-
(2008)
OSDI
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
12
-
-
33751059192
-
Execution generated test cases: How to make systems code crash itself
-
C. Cadar and D. Engler. Execution generated test cases: How to make systems code crash itself. In SPIN, 2005.
-
(2005)
SPIN
-
-
Cadar, C.1
Engler, D.2
-
14
-
-
0003517965
-
-
Technical Report, Department of Computer Science, Hong Kong University of Science and Technology
-
T. Chen, S. Cheung, and S. Yiu. Metamorphic testing: A new approach for generating next test cases. Technical Report HKUST-CS98-01, Department of Computer Science, Hong Kong University of Science and Technology, 1998.
-
(1998)
Metamorphic Testing: A New Approach for Generating Next Test Cases
-
-
Chen, T.1
Cheung, S.2
Yiu, S.3
-
15
-
-
1542487771
-
A simple and practical approach to unit testing: The JML and JUnit way
-
Y. Cheon and G. Leavens. A simple and practical approach to unit testing: The JML and JUnit way. In ECOOP, 2002.
-
(2002)
ECOOP
-
-
Cheon, Y.1
Leavens, G.2
-
16
-
-
84881218966
-
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
-
J. Clark and P. van Oorschot. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In S&P, 2013.
-
(2013)
S&P
-
-
Clark, J.1
Van Oorschot, P.2
-
17
-
-
84871954941
-
-
Comodo report of incident. http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html, 2011.
-
(2011)
Comodo Report of Incident
-
-
-
19
-
-
84914111458
-
Web PKI: Closing the gap between guidelines and practices
-
A. Delignat-Lavaud, M. Abadi, A. Birrell, I. Mironov, T. Wobber, and Y. Xie. Web PKI: Closing the gap between guidelines and practices. In NDSS, 2014.
-
(2014)
NDSS
-
-
Delignat-Lavaud, A.1
Abadi, M.2
Birrell, A.3
Mironov, I.4
Wobber, T.5
Xie, Y.6
-
20
-
-
0034997451
-
Finding failures by cluster analysis of execution profiles
-
W. Dickinson, D. Leon, and A. Podgurski. Finding failures by cluster analysis of execution profiles. In ICSE, 2001.
-
(2001)
ICSE
-
-
Dickinson, W.1
Leon, D.2
Podgurski, A.3
-
21
-
-
84940397122
-
Origin-bound certificates: A fresh approach to strong client authentication for the Web
-
M. Dietz, A. Czeskis, D. Balfanz, and D. Wallach. Origin-bound certificates: A fresh approach to strong client authentication for the Web. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Dietz, M.1
Czeskis, A.2
Balfanz, D.3
Wallach, D.4
-
26
-
-
85064040125
-
ZMap: Fast Internet-wide scanning and its security applications
-
Z. Durumeric, E. Wustrow, and A. Halderman. ZMap: Fast Internet-wide scanning and its security applications. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Durumeric, Z.1
Wustrow, E.2
Halderman, A.3
-
27
-
-
80053025624
-
An observatory for the SSLiverse
-
P. Eckersley and J. Burns. An observatory for the SSLiverse. In DEFCON, 2010.
-
(2010)
DEFCON
-
-
Eckersley, P.1
Burns, J.2
-
28
-
-
33750285595
-
Static and dynamic analysis: Synergy and duality
-
M. Ernst. Static and dynamic analysis: Synergy and duality. In WODA, 2003.
-
(2003)
WODA
-
-
Ernst, M.1
-
29
-
-
84914179242
-
Why eve and mallory love android: An analysis of SSl (in)security on Android
-
S. Fahl, M. Harbach, T. Muders, and M. Smith. Why Eve and Mallory love Android: An analysis of SSl (in)security on Android. In CCS, 2012.
-
(2012)
CCS
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
-
31
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The most dangerous code in the world: Validating SSL certificates in non-browser software. In CCS, 2012.
-
(2012)
CCS
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
32
-
-
84914111457
-
Systematic testing of refactoring engines on real software projects
-
M. Gligoric, F. Behrang, Y. Li, J. Overbey, M. Hafiz, and D. Marinov. Systematic testing of refactoring engines on real software projects. In ECOOP, 2013.
-
(2013)
ECOOP
-
-
Gligoric, M.1
Behrang, F.2
Li, Y.3
Overbey, J.4
Hafiz, M.5
Marinov, D.6
-
33
-
-
84914111456
-
-
CVE-2014-0092. https://bugzilla.redhat.com/show bug.cgi?id= 1069865, 2014.
-
(2014)
-
-
CVE-2014-00921
-
35
-
-
31844450371
-
DART: Directed automated random testing
-
P. Godefroid, N. Klarlund, and K. Sen. DART: Directed automated random testing. In PLDI, 2005.
-
(2005)
PLDI
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
37
-
-
85008255060
-
Precise interface identification to improve testing and analysis of web applications
-
W. Halfond, S. Anand, and A. Orso. Precise interface identification to improve testing and analysis of web applications. In ISSTA, 2009.
-
(2009)
ISSTA
-
-
Halfond, W.1
Anand, S.2
Orso, A.3
-
40
-
-
84914111455
-
-
CVE-2011-0228. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0228, 2011.
-
(2011)
-
-
CVE-2011-02281
-
42
-
-
84876950829
-
Abusing file processing in malware detectors for fun and profit
-
S. Jana and V. Shmatikov. Abusing file processing in malware detectors for fun and profit. In S&P, 2012.
-
(2012)
S&P
-
-
Jana, S.1
Shmatikov, V.2
-
44
-
-
84869398182
-
PKI layer cake: New collision attacks against the global X.509 infrastructure
-
D. Kaminsky, M. Patterson, and L. Sassaman. PKI layer cake: New collision attacks against the global X.509 infrastructure. In FC, 2010.
-
(2010)
FC
-
-
Kaminsky, D.1
Patterson, M.2
Sassaman, L.3
-
45
-
-
4544361507
-
Generalized symbolic execution for model checking and testing
-
S. Khurshid, C. Pasareanu, and W. Visser. Generalized symbolic execution for model checking and testing. In TACAS, 2003.
-
(2003)
TACAS
-
-
Khurshid, S.1
Pasareanu, C.2
Visser, W.3
-
46
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
A. Kiezun, P. Guo, K. Jayaraman, and M. Ernst. Automatic creation of SQL injection and cross-site scripting attacks. In ICSE, 2009.
-
(2009)
ICSE
-
-
Kiezun, A.1
Guo, P.2
Jayaraman, K.3
Ernst, M.4
-
47
-
-
0016971687
-
Symbolic execution and program testing
-
J. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.7
-
-
King, J.1
-
48
-
-
33745875641
-
Controllable combinatorial coverage in grammar-based testing
-
Lecture Notes in Computer Science
-
R. Lammel and W. Schulte. Controllable combinatorial coverage in grammar-based testing. In Testing of Communicating Systems, Lecture Notes in Computer Science, pages 19-38. 2006.
-
(2006)
Testing of Communicating Systems
, pp. 19-38
-
-
Lammel, R.1
Schulte, W.2
-
50
-
-
84864273340
-
-
A. Lenstra, J. Hughes, M. Augier, J. Bos, T. Kleinjung, and C. Wachter. Ron was wrong, Whit is right. http://eprint.iacr.org/2012/064, 2012.
-
(2012)
Ron Was Wrong, Whit is Right
-
-
Lenstra, A.1
Hughes, J.2
Augier, M.3
Bos, J.4
Kleinjung, T.5
Wachter, C.6
-
51
-
-
58049169957
-
Directed test generation using symbolic grammars
-
R. Majumdar and R. Xu. Directed test generation using symbolic grammars. In ASE, 2007.
-
(2007)
ASE
-
-
Majumdar, R.1
Xu, R.2
-
52
-
-
37849023827
-
An interpretation of Purdom's algorithm for automatic generation of test cases
-
B. Malloy and J. Power. An interpretation of Purdom's algorithm for automatic generation of test cases. In ICIS, 2001.
-
(2001)
ICIS
-
-
Malloy, B.1
Power, J.2
-
53
-
-
67650736074
-
Test era: A novel framework for automated testing of Java programs
-
D. Marinov and S. Khurshid. Test Era: A novel framework for automated testing of Java programs. In ASE, 2001.
-
(2001)
ASE
-
-
Marinov, D.1
Khurshid, S.2
-
58
-
-
0025452154
-
Generating test data with enhanced context-free grammars
-
P. Maurer. Generating test data with enhanced context-free grammars. IEEE Software, 7(4):50-55, 1990.
-
(1990)
IEEE Software
, vol.7
, Issue.4
, pp. 50-55
-
-
Maurer, P.1
-
59
-
-
4043152821
-
Differential testing for software
-
W. McKeeman. Differential testing for software. Digital Technical Journal, 10(1):100-107, 1998.
-
(1998)
Digital Technical Journal
, vol.10
, Issue.1
, pp. 100-107
-
-
McKeeman, W.1
-
60
-
-
84910676171
-
Practical issues with TLS client certificate authentication
-
A. Parsovs. Practical issues with TLS client certificate authentication. In NDSS, 2014.
-
(2014)
NDSS
-
-
Parsovs, A.1
-
61
-
-
0037587321
-
Automated support for classifying software failure reports
-
A. Podgurski, D. Leon, P. Francis, W. Masri, M. Minch, J. Sun, and B. Wang. Automated support for classifying software failure reports. In ICSE, 2003.
-
(2003)
ICSE
-
-
Podgurski, A.1
Leon, D.2
Francis, P.3
Masri, W.4
Minch, M.5
Sun, J.6
Wang, B.7
-
62
-
-
33745173348
-
A sentence generator for testing parsers
-
P. Purdom. A sentence generator for testing parsers. BIT Numerical Mathematics, 12:366-375, 1972.
-
(1972)
BIT Numerical Mathematics
, vol.12
, pp. 366-375
-
-
Purdom, P.1
-
63
-
-
84883736511
-
Practical, low-effort equivalence verification of real code
-
D. Ramos and D. Engler. Practical, low-effort equivalence verification of real code. In CAV, 2011.
-
(2011)
CAV
-
-
Ramos, D.1
Engler, D.2
-
64
-
-
0003956839
-
-
version 1.0
-
The TLS protocol version 1.0. http://tools.ietf.org/html/rfc2246, 1999.
-
(1999)
The TLS Protocol
-
-
-
66
-
-
2942597551
-
-
HTTP over TLS. http://www.ietf.org/rfc/rfc2818.txt, 2000.
-
(2000)
HTTP over TLS
-
-
-
73
-
-
77955220343
-
A symbolic execution framework for Java Script
-
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song. A symbolic execution framework for Java Script. In S&P, 2010.
-
(2010)
S&P
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
74
-
-
32344447459
-
CUTE: A concolic unit testing engine for C
-
K. Sen, D. Marinov, and G. Agha. CUTE: A concolic unit testing engine for C. In FSE, 2005.
-
(2005)
FSE
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
76
-
-
79959910753
-
A security policy oracle: Detecting security holes using multiple API implementations
-
V. Srivastava, M. Bond, K. McKinley, and V. Shmatikov. A security policy oracle: Detecting security holes using multiple API implementations. In PLDI, 2011.
-
(2011)
PLDI
-
-
Srivastava, V.1
Bond, M.2
McKinley, K.3
Shmatikov, V.4
-
77
-
-
82955204031
-
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
-
M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D. Osvik, and B. Weger. Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In CRYPTO, 2009.
-
(2009)
CRYPTO
-
-
Stevens, M.1
Sotirov, A.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.6
Weger, B.7
-
79
-
-
79959889388
-
Finding and understanding bugs in C compilers
-
X. Yang, Y. Chen, E. Eide, and J. Regehr. Finding and understanding bugs in C compilers. In PLDI, 2011.
-
(2011)
PLDI
-
-
Yang, X.1
Chen, Y.2
Eide, E.3
Regehr, J.4
|