-
1
-
-
0023453626
-
Learning regular sets from queries and counterexamples
-
ANGLUIN, D. Learning regular sets from queries and counterexamples. Information and Computation 75, 2 (1987), 87-106.
-
(1987)
Information and Computation
, vol.75
, Issue.2
, pp. 87-106
-
-
Angluin, D.1
-
2
-
-
0034818448
-
Automatic predicate abstraction of c programs
-
ACM SIGPLAN Notices, ACM Press
-
BALL, T., MAJUMDAR, R., MILLSTEIN, T., AND RAJAMANI, S. Automatic Predicate Abstraction of C Programs. In PLDI'01: Proc. of the ACM SIGPLAN 2001 Conf. on Programming Language Design and Implementation (2001), vol. 36 of ACM SIGPLAN Notices, ACM Press, pp. 203-213.
-
(2001)
PLDI'01: Proc. Of the ACM SIGPLAN 2001 Conf. Of Programming Language Design and Implementation
, vol.36
, pp. 203-213
-
-
Ball, T.1
Majumdar, R.2
Millstein, T.3
Rajamani, S.4
-
3
-
-
84885608064
-
Verified software: Theories, tools, experiments
-
Springer-Verlag, ch
-
BARNETT, M., DELINE, R., F ÄHNDRICH, M., JACOBS, B., LEINO, K. R., SCHULTE, W., AND VENTER, H. Verified software: Theories, tools, experiments. Springer-Verlag, 2008, ch. The Spec# Programming System: Challenges and Directions, pp. 144-152.
-
(2008)
The Spec# Programming System: Challenges and Directions
, pp. 144-152
-
-
Barnett, M.1
Deline, R.2
Ähndrich, F.M.3
Jacobs, B.4
Leino, K.R.5
Schulte, W.6
Venter, H.7
-
4
-
-
85082364656
-
Design, deployment, and use of the DETER testbed
-
USENIX Association
-
BENZEL, T., BRADEN, R., KIM, D., NEUMAN, C., JOSEPH, A., SKLOWER, K., OSTRENGA, R., AND SCHWAB, S. Design, deployment, and use of the DETER testbed. In Proc. of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test (2007), USENIX Association.
-
(2007)
Proc. Of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
5
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
-
CABALLERO, J., POOSANKAM, P., KREIBICH, C., AND SONG, D. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In CCS'09: Proc. of the 16th ACM conference on Computer and communications security (2009), ACM, pp. 621-634.
-
(2009)
CCS'09: Proc. Of the 16th ACM Conference on Computer and Communications Security
, pp. 621-634
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
6
-
-
77952403312
-
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
-
CABALLERO, J., YIN, H., LIANG, Z., AND SONG, D. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In CCS'07: Proc. of the 14th ACM Conf. on Computer and Communications Security (2007), ACM, pp. 317-329.
-
(2007)
CCS'07: Proc. Of the 14th ACM Conf. Of Computer and Communications Security
, pp. 317-329
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
7
-
-
85076893888
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
USENIX Association
-
CADAR, C., DUNBAR, D., AND ENGLER, D. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI'08: Proc. of the 8th USENIX Symposium on Operating Systems Design and Implementation (2008), USENIX Association, pp. 209-224.
-
(2008)
OSDI'08: Proc. Of the 8th USENIX Symposium on Operating Systems Design and Implementation
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
8
-
-
26944472789
-
Execution generated test cases: How to make systems code crash itself
-
Lecture Notes in Computer Science, Springer
-
CADAR, C., AND ENGLER, D. R. Execution generated test cases: How to make systems code crash itself. In SPIN'05: Proc. of the 12th Int. SPIN Workshop on Model Checking Software (2005), vol. 3639 of Lecture Notes in Computer Science, Springer, pp. 2-23.
-
(2005)
SPIN'05: Proc. Of the 12th Int. SPIN Workshop on Model Checking Software
, vol.3639
, pp. 2-23
-
-
Cadar, C.1
Engler, D.R.2
-
9
-
-
57849087817
-
Exe: Automatically generating inputs of death
-
CADAR, C., GANESH, V., PAWLOWSKI, P. M., DILL, D. L., AND ENGLER, D. R. Exe: Automatically generating inputs of death. ACM Trans. Inf. Syst. Secur. 12 (2008), 1-38.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.12
, pp. 1-38
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
DIll, D.L.4
Engler, D.R.5
-
10
-
-
78650035884
-
Inference and analysis of formal models of botnet command and control protocols
-
CHO, C. Y., BABIĆ, D., SHIN, R., AND SONG, D. Inference and analysis of formal models of botnet command and control protocols. In CCS'10: Proc. of the 2010 ACM Conf. on Computer and Communications Security (2010), ACM, pp. 426-440.
-
(2010)
CCS'10: Proc. Of the 2010 ACM Conf. Of Computer and Communications Security
, pp. 426-440
-
-
Cho, C.Y.1
Babić, D.2
Shin, R.3
Song, D.4
-
11
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
USENIX Association
-
CHO, C. Y., CABALLERO, J., GRIER, C., PAXSON, V., AND SONG, D. Insights from the inside: A view of botnet management from infiltration. In LEET'10: Proc. of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (2010), USENIX Association, pp. 1-1.
-
(2010)
LEET'10: Proc. Of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
12
-
-
70350402293
-
Prospex: Protocol specification extraction
-
IEEE Computer Society
-
COMPARETTI, P. M., WONDRACEK, G., KRUEGEL, C., AND KIRDA, E. Prospex: Protocol specification extraction. In S&P'09: Proc. of the 2009 30th IEEE Symposium on Security and Privacy (2009), IEEE Computer Society, pp. 110-125.
-
(2009)
S&P'09: Proc. Of the 2009 30th IEEE Symposium on Security and Privacy
, pp. 110-125
-
-
Comparetti, P.M.1
Wondracek, G.2
Kruegel, C.3
Kirda, E.4
-
13
-
-
0004116989
-
-
The MIT Press
-
CORMEN, T. H., LEISERSON, C. E., RIVEST, R. L., AND STEIN, C. Introduction to Algorithms, 2nd ed. The MIT Press, 2001.
-
(2001)
Introduction to Algorithms, 2nd Ed
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
14
-
-
84893143817
-
Discoverer: Automatic protocol reverse engineering from network traces
-
USENIX Association
-
CUI, W., KANNAN, J., AND WANG, H. J. Discoverer: Automatic protocol reverse engineering from network traces. In Proc. of 16th USENIX Security Symposium (2007), USENIX Association, pp. 1-14.
-
(2007)
Proc. Of 16th USENIX Security Symposium
, pp. 1-14
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
15
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
CUI, W., PEINADO, M., CHEN, K., WANG, H. J., AND IRÚN-BRIZ, L. Tupni: Automatic reverse engineering of input formats. In CCS'08: Proc. of the 15th ACM Conf. on Computer and Communications Security (2008), ACM, pp. 391-402.
-
(2008)
CCS'08: Proc. Of the 15th ACM Conf. Of Computer and Communications Security
, pp. 391-402
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irún-Briz, L.5
-
17
-
-
31844450371
-
DART: Directed automated random testing
-
GODEFROID, P., KLARLUND, N., AND SEN, K. DART: Directed automated random testing. In PLDI'05: Proc. of the ACMSIGPLAN Conf. on Programming Language Design and Implementation (2005), ACM, pp. 213-223.
-
(2005)
PLDI'05: Proc. Of the ACMSIGPLAN Conf. Of Programming Language Design and Implementation
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
19
-
-
34547150779
-
SYNERGY: A new algorithm for property checking
-
GULAVANI, B. S., HENZINGER, T. A., KANNAN, Y., NORI, A. V., AND RAJAMANI, S. K. SYNERGY: A new algorithm for property checking. In FSE'06: Proc. of the 14th ACM SIGSOFT Int. Symp. on Foundations of Software Engineering (2006), ACM, pp. 117-127.
-
(2006)
FSE'06: Proc. Of the 14th ACM SIGSOFT Int. Symp. Of Foundations of Software Engineering
, pp. 117-127
-
-
Gulavani, B.S.1
Henzinger, T.A.2
Kannan, Y.3
Nori, A.V.4
Rajamani, S.K.5
-
20
-
-
35248827669
-
Software Verification with Blast
-
LNCS, Springer-Verlag
-
HENZINGER, T. A., JHALA, R., MAJUMDAR, R., AND SUTRE, G. Software Verification with Blast. In SPIN'03: Proc. of the 10th Int. Workshop on Model Checking of Software (2003), vol. 2648 of LNCS, Springer-Verlag, pp. 235-239.
-
(2003)
SPIN'03: Proc. Of the 10th Int. Workshop on Model Checking of Software
, vol.2648
, pp. 235-239
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
21
-
-
0034480956
-
Smart simulation using collaborative formal and simulation engines
-
IEEE Press
-
HO, P. H., SHIPLE, T., HARER, K., KUKULA, J., DAMIANO, R., BERTACCO, V., TAYLOR, J., AND LONG, J. Smart simulation using collaborative formal and simulation engines. In ICCAD'00: Proc. of the 2000 IEEE/ACM Int. Conf. on Computer-aided design (2000), IEEE Press, pp. 120-126.
-
(2000)
ICCAD'00: Proc. Of the 2000 IEEE/ACM Int. Conf. Of Computer-aided Design
, pp. 120-126
-
-
Ho, H.P.1
Shiple, T.2
Harer, K.3
Kukula, J.4
Damiano, R.5
Bertacco, V.6
Taylor, J.7
Long, J.8
-
22
-
-
0016971687
-
Symbolic execution and program testing
-
KING, J. C. Symbolic execution and program testing. Communications of the ACM 19, 7 (1976), 385-394.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
23
-
-
78049442327
-
A method for synthesizing sequential circuits
-
MEALY, G. H. A method for synthesizing sequential circuits. Bell System Technical Journal 34, 5 (1955), 1045-1079.
-
(1955)
Bell System Technical Journal
, vol.34
, Issue.5
, pp. 1045-1079
-
-
Mealy, G.H.1
-
24
-
-
15844378350
-
Black box checking
-
Kluwer, B.V.
-
PELED, D., VARDI, M. Y., AND YANNAKAKIS, M. Black box checking. In Proc. of the IFIP TC6 WG6.1 Joint Int. Conf. on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XII) and Protocol Specification, Testing and Verification (PSTV XIX) (1999), Kluwer, B.V., pp. 225-240.
-
(1999)
Proc. Of the IFIP TC6 WG6.1 Joint Int. Conf. Of Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XII) and Protocol Specification, Testing and Verification (PSTV XIX)
, pp. 225-240
-
-
Peled, D.1
Vardi, M.Y.2
Yannakakis, M.3
-
25
-
-
32344447459
-
Cute: A concolic unit testing engine for c
-
SEN, K., MARINOV, D., AND AGHA, G. Cute: A concolic unit testing engine for c. SIGSOFT Softw. Eng. Notes 30 (2005), 263-272.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, pp. 263-272
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
27
-
-
43049143056
-
Formal methods and testing
-
VEANES, M., CAMPBELL, C., GRIESKAMP, W., SCHULTE, W., TILLMANN, N., AND NACHMANSON, L. Formal methods and testing. Springer-Verlag, 2008, ch. Model-based testing of object-oriented reactive systems with spec explorer, pp. 39-76.
-
Springer-Verlag, 2008, Ch. Model-based Testing of Object-oriented Reactive Systems with Spec Explorer
, pp. 39-76
-
-
Veanes, M.1
Campbell, C.2
Grieskamp, W.3
Schulte, W.4
Tillmann, N.5
Nachmanson, L.6
-
29
-
-
70350399651
-
ReFormat: Automatic reverse engineering of encrypted messages
-
Lecture Notes in Computer Science, Springer
-
WANG, Z., JIANG, X., CUI, W., WANG, X., AND GRACE, M. ReFormat: Automatic reverse engineering of encrypted messages. In ESORICS'09: 14th European Symposium on Research in Computer Security (2009), vol. 5789 of Lecture Notes in Computer Science, Springer, pp. 200-215.
-
(2009)
ESORICS'09: 14th European Symposium on Research in Computer Security
, vol.5789
, pp. 200-215
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
Grace, M.5
-
30
-
-
0035209012
-
Efficient conflict driven learning in a boolean satisfiability solver
-
IEEE Press
-
ZHANG, L., MADIGAN, C. F., MOSKEWICZ, M. H., AND MALIK, S. Efficient conflict driven learning in a boolean satisfiability solver. In ICCAD'01: Proc. of the Int. Conf. on Computer-Aided Design (2001), IEEE Press, pp. 279-285.
-
(2001)
ICCAD'01: Proc. Of the Int. Conf. Of Computer-Aided Design
, pp. 279-285
-
-
Zhang, L.1
Madigan, C.F.2
Moskewicz, M.H.3
Malik, S.4
|