-
3
-
-
50249149602
-
Preventing memory error exploits with WIT
-
S & P'08
-
AKRITIDIS, P., CADAR, C., RAICIU, C., COSTA, M., and CASTRO, M. Preventing memory error exploits with WIT. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008), S & P'08.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
4
-
-
80051934403
-
Statically-directed dynamic automated test generation
-
ISSTA'11
-
BABIĆ, D., MARTIGNONI, L., MCCAMANT, S., and SONG, D. Statically-directed dynamic automated test generation. In Proceedings of the 2011 International Symposium on Software Testing and Analysis (2011), ISSTA'11.
-
(2011)
Proceedings of the 2011 International Symposium on Software Testing and Analysis
-
-
Babić, D.1
Martignoni, L.2
Mccamant, S.3
Song, D.4
-
5
-
-
33750230605
-
SNOOZE: Toward a stateful network protocol fuzZEr
-
ISC'06
-
BANKS, G., COVA, M., FELMETSGER, V., ALMEROTH, K., KEMMERER, R., and VIGNA, G. SNOOZE: toward a stateful network protocol fuzZEr. In Proceedings of the 9th international conference on Information Security (2006), ISC'06.
-
(2006)
Proceedings of the 9th International Conference on Information Security
-
-
Banks, G.1
Cova, M.2
Felmetsger, V.3
Almeroth, K.4
Kemmerer, R.5
Vigna, G.6
-
6
-
-
77955868819
-
Strict control dependence and its effect on dynamic information flow analyses
-
ISSTA'10
-
BAO, T., ZHENG, Y., LIN, Z., ZHANG, X., and XU, D. Strict control dependence and its effect on dynamic information flow analyses. In Proceedings of the 19th International Symposium on Software testing and analysis (2010), ISSTA'10.
-
(2010)
Proceedings of the 19th International Symposium on Software Testing and Analysis
-
-
Bao, T.1
Zheng, Y.2
Lin, Z.3
Zhang, X.4
Xu, D.5
-
8
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
CADAR, C., GANESH, V., PAWLOWSKI, P. M., and DILL., D. L., and ENGLER, D. R. EXE: Automatically generating inputs of death. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security (2006).
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
SSYM'98
-
COWAN, C., PU, C., MAIER, D., HINTONY, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., and ZHANG, Q. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the 7th USENIX Security Symposium (1998), SSYM'98.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
13
-
-
85076282614
-
The evolving art of fuzzng
-
DEMOTT, J. The evolving art of fuzzng. DEFCON 14, http://www.appliedsec.com/files/The_Evolving_Art_of_Fuzzing 2005.
-
(2005)
DEFCON
, vol.14
-
-
Demott, J.1
-
14
-
-
0023385308
-
The program dependence graph and its use in optimization
-
FERRANTE, J., and OTTENSTEIN., K. J., and WARREN, J. D. The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. 9 (1997), 319-349.
-
(1997)
ACM Trans. Program. Lang. Syst.
, vol.9
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
16
-
-
70349244714
-
Prioritizing software security fortification through code-level metrics
-
Oct. QoP'08, ACM Press
-
GEGICK, M., WILLIAMS, L., OSBORNE, J., and VOUK, M. Prioritizing software security fortification through code-level metrics. In Proc. of the 4th ACM workshop on Quality of protection (Oct. 2008), QoP'08, ACM Press.
-
(2008)
Proc. Of the 4th ACM Workshop on Quality of Protection
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
21
-
-
84866721423
-
DTA++: Dynamic taint analysis with targeted control-flow propagation
-
NDSS'11
-
KANG, M. G., MCCAMANT, S., POOSANKAM, P., and SONG, D. DTA++: Dynamic taint analysis with targeted control-flow propagation. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (2011), NDSS'11.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium
-
-
Kang, M.G.1
Mccamant, S.2
Poosankam, P.3
Song, D.4
-
25
-
-
0025557712
-
An empirical study of the reliability of UNIX utilities
-
Dec
-
MILLER, B. P., FREDRIKSEN, L., and SO, B. An empirical study of the reliability of UNIX utilities. Commun. ACM 33 (Dec 1990), 32-44.
-
(1990)
Commun. ACM
, vol.33
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
28
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
SP'07, IEEE Computer Society
-
MOSER, A., KRUEGEL, C., and KIRDA, E. Exploring multiple execution paths for malware analysis. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (2007), SP'07, IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
31
-
-
27544444280
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
-
NDSS'05
-
NEWSOME, J., and SONG, D. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Proceedings of the Network and Distributed Systems Security Symposium (2005), NDSS'05.
-
(2005)
Proceedings of the Network and Distributed Systems Security Symposium
-
-
Newsome, J.1
Song, D.2
-
34
-
-
85077122585
-
AddressSanitizer: A fast address sanity checker
-
SEREBRYANY, K., BRUENING, D., POTAPENKO, A., and VYUKOV, D. AddressSanitizer: A fast address sanity checker. In Proceedings of USENIX Annual Technical Conference (2012).
-
(2012)
Proceedings of USENIX Annual Technical Conference
-
-
Serebryany, K.1
Bruening, D.2
Potapenko, A.3
Vyukov, D.4
-
39
-
-
85076302358
-
-
SPIKE. http://www.immunitysec.com/resources-freesoftware.shtml.
-
SPIKE
-
-
-
41
-
-
84910619072
-
Memory errors: The past, the present, and the future
-
RAID'12
-
VAN DER VEEN, V., DUTT-SHARMA, N., CAVALLARO, L., AND BOS, H. Memory Errors: The Past, the Present, and the Future. In Proceedings of The 15th International Symposium on Research in Attacks, Intrusions and Defenses (2012), RAID'12.
-
(2012)
Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses
-
-
Van Der Veen, V.1
Dutt-Sharma, N.2
Cavallaro, L.3
Bos, H.4
-
42
-
-
77955183968
-
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
-
SP'10
-
WANG, T., WEI, T., GU, G., and ZOU, W. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. In Proceedings of the 31st IEEE Symposium on Security and Privacy (2010), SP'10.
-
(2010)
Proceedings of the 31st IEEE Symposium on Security and Privacy
-
-
Wang, T.1
Wei, T.2
Gu, G.3
Zou, W.4
-
44
-
-
77954485601
-
Searching for a needle in a haystack: Predicting security vulnerabilities for windows vista
-
Apr. ICST'10
-
ZIMMERMANN, T., NAGAPPAN, N., and WILLIAMS, L. Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista. In Proc. of the 3rd International Conference on Software Testing, Verification and Validation (Apr. 2010), ICST'10.
-
(2010)
Proc. Of the 3rd International Conference on Software Testing, Verification and Validation
-
-
Zimmermann, T.1
Nagappan, N.2
Williams, L.3
|