-
1
-
-
84995440856
-
-
Accessed on 08/10/2016
-
Peach fuzzer. http://www.peachfuzzer.com/. (Accessed on 08/10/2016).
-
-
-
Peach fuzzer1
-
2
-
-
84883323315
-
Formal models of bank cards for free
-
F. Aarts, J. D. Ruiter, and E. Poll. Formal models of bank cards for free. In Software Testing, Verification and Validation Workshops (ICSTW), IEEE International Conference on, 2013.
-
(2013)
Software Testing, Verification and Validation Workshops (ICSTW), IEEE International Conference on
-
-
Aarts, F.1
Ruiter, J.D.2
Poll, E.3
-
4
-
-
0023453626
-
Learning regular sets from queries and counterexamples
-
D. Angluin. Learning regular sets from queries and counterexamples. Information and computation, 75(2):87-106, 1987.
-
(1987)
Information and Computation
, vol.75
, Issue.2
, pp. 87-106
-
-
Angluin, D.1
-
5
-
-
84987608764
-
Back in black: Towards formal, black-box analysis of sanitizers and filters
-
G. Argyros, I. Stais, A. Keromytis, and A. Kiayias. Back in black: Towards formal, black-box analysis of sanitizers and filters. In Security and privacy (S&P), 2016 IEEE symposium on, 2016.
-
(2016)
Security and Privacy (S&P), 2016 IEEE Symposium on
-
-
Argyros, G.1
Stais, I.2
Keromytis, A.3
Kiayias, A.4
-
7
-
-
84874183838
-
∗: Symbolic learning of input-output specifications
-
∗: Symbolic Learning of Input-Output Specifications. In POPL, 2013.
-
(2013)
POPL
-
-
Botinćan, M.1
Babić, D.2
-
8
-
-
84914109052
-
Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations
-
C. Brubaker, S. Jana, B. Ray, S. Khurshid, and V. Shmatikov. Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations. In Security and privacy (S&P), 2016 IEEE symposium on, 2014.
-
(2014)
Security and Privacy (S&P), 2016 IEEE Symposium on
-
-
Brubaker, C.1
Jana, S.2
Ray, B.3
Khurshid, S.4
Shmatikov, V.5
-
9
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In USENIX Security Symposium (USENIX Security), 2007.
-
(2007)
USENIX Security Symposium (USENIX Security)
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
10
-
-
58449114073
-
FiG: Automatic fingerprint generation
-
J. Caballero, S. Venkataraman, P. Poosankam, M. Kang, D. Song, and A. Blum. FiG: Automatic fingerprint generation. Department of Electrical and Computing Engineering, page 27, 2007.
-
(2007)
Department of Electrical and Computing Engineering
, pp. 27
-
-
Caballero, J.1
Venkataraman, S.2
Poosankam, P.3
Kang, M.4
Song, D.5
Blum, A.6
-
11
-
-
84975865189
-
Coverage-directed differential testing of JVM implementations
-
ACM
-
Y. Chen, T. Su, C. Sun, Z. Su, and J. Zhao. Coverage-directed differential testing of JVM implementations. In Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 85-99. ACM, 2016.
-
(2016)
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 85-99
-
-
Chen, Y.1
Su, T.2
Sun, C.3
Su, Z.4
Zhao, J.5
-
12
-
-
0017973244
-
Testing software design modeled by finite-state machines
-
T. Chow. Testing software design modeled by finite-state machines. IEEE transactions on software engineering, (3): 178-187, 1978.
-
(1978)
IEEE Transactions on Software Engineering
, vol.3
, pp. 178-187
-
-
Chow, T.1
-
14
-
-
84894057794
-
Minimization of symbolic automata
-
ACM
-
L. D'Antoni and M. Veanes. Minimization of symbolic automata. In ACM SIGPLAN Notices, volume 49, pages 541-553. ACM, 2014.
-
(2014)
ACM SIGPLAN Notices
, vol.49
, pp. 541-553
-
-
D'Antoni, L.1
Veanes, M.2
-
20
-
-
70349276980
-
Privacy oracle: A system for finding application leaks with black box differential testing
-
J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno. Privacy oracle: a system for finding application leaks with black box differential testing. In CCS, 2008.
-
(2008)
CCS
-
-
Jung, J.1
Sheth, A.2
Greenstein, B.3
Wetherall, D.4
Maganis, G.5
Kohno, T.6
-
21
-
-
85046561721
-
Lower bounds for natural proof systems
-
D. Kozen. Lower bounds for natural proof systems. In FOCS, 1977.
-
(1977)
FOCS
-
-
Kozen, D.1
-
23
-
-
4043152821
-
Differential testing for software
-
W. McKeeman. Differential testing for software. Digital Technical Journal, 10(1), 1998.
-
(1998)
Digital Technical Journal
, vol.10
, Issue.1
-
-
McKeeman, W.1
-
30
-
-
84857154066
-
Symbolic finite state transducers: Algorithms and applications
-
M. Veanes, P. Hooimeijer, B. Livshits, D. Molnar, and N. Bjorner. Symbolic finite state transducers: Algorithms and applications. ACM SIGPLAN Notices, 47, 2012.
-
(2012)
ACM SIGPLAN Notices
, pp. 47
-
-
Veanes, M.1
Hooimeijer, P.2
Livshits, B.3
Molnar, D.4
Bjorner, N.5
-
32
-
-
79959889388
-
Finding and understanding bugs in C compilers
-
X. Yang, Y. Chen, E. Eide, and J. Regehr. Finding and understanding bugs in C compilers. In PLDI, 2011.
-
(2011)
PLDI
-
-
Yang, X.1
Chen, Y.2
Eide, E.3
Regehr, J.4
|