-
1
-
-
65749112026
-
-
Last accessed Jun 2013
-
Amazon. Amazon elastic compute cloud. http://aws.amazon.com/ec2, 2013. Last accessed Jun 2013.
-
(2013)
Amazon Elastic Compute Cloud
-
-
-
3
-
-
79960025017
-
A decade of software model checking with SLAM
-
July
-
T. Ball, V. Levin, and S. K. Rajamani. A decade of software model checking with SLAM. Commun. ACM, 54(7):68-76, July 2011.
-
(2011)
Commun. ACM
, vol.54
, Issue.7
, pp. 68-76
-
-
Ball, T.1
Levin, V.2
Rajamani, S.K.3
-
4
-
-
75749147262
-
A few billion lines of code later: Using static analysis to find bugs in the real world
-
Feb.
-
A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, C. Henri-Gros, A. Kamsky, S. McPeak, and D. Engler. A few billion lines of code later: using static analysis to find bugs in the real world. Commun. ACM, 53(2):66-75, Feb. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.2
, pp. 66-75
-
-
Bessey, A.1
Block, K.2
Chelf, B.3
Chou, A.4
Fulton, B.5
Hallem, S.6
Henri-Gros, C.7
Kamsky, A.8
McPeak, S.9
Engler, D.10
-
5
-
-
35348951470
-
The software model checker blast: Applications to software engineering
-
Oct.
-
D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. The software model checker Blast: Applications to software engineering. Int. J. Softw. Tools Technol. Transf., 9(5):505-525, Oct. 2007.
-
(2007)
Int. J. Softw. Tools Technol. Transf.
, vol.9
, Issue.5
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
6
-
-
47249130414
-
RWset: Attacking path explosion in constraint-based test generation
-
C. Ramakrishnan and J. Rehof, editors Springer Berlin Heidelberg
-
P. Boonstoppel, C. Cadar, and D. Engler. RWset: Attacking path explosion in constraint-based test generation. In C. Ramakrishnan and J. Rehof, editors, Tools and Algorithms for the Construction and Analysis of Systems, Volume 4963 of Lecture Notes in Computer Science, pages 351-366. Springer Berlin Heidelberg, 2008.
-
(2008)
Tools and Algorithms for the Construction and Analysis of Systems, Volume 4963 of Lecture Notes in Computer Science
, pp. 351-366
-
-
Boonstoppel, P.1
Cadar, C.2
Engler, D.3
-
7
-
-
58449115871
-
BitScope: Automatically dissecting Malicious binaries
-
D. Brumley, C. Hartwig, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, D. Song, and H. Yin. BitScope: Automatically dissecting malicious binaries. Technical report, In CMU-CS-07-133, 2007.
-
(2007)
Technical Report, in CMU-CS-07-133
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
Yin, H.8
-
8
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
IEEE Computer Society
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (SP), pages 2-16. IEEE Computer Society, 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (SP)
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
9
-
-
79955963313
-
Parallel symbolic execution for automated real-world software testing
-
S. Bucur, V. Ureche, C. Zamfir, and G. Candea. Parallel symbolic execution for automated real-world software testing. In EuroSys, pages 183-198, 2011.
-
(2011)
EuroSys
, pp. 183-198
-
-
Bucur, S.1
Ureche, V.2
Zamfir, C.3
Candea, G.4
-
11
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: automatically generating inputs of death. In ACM Conference on Computer and Communications security, pages 322-335. ACM, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
12
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of USENIX Security, 2011.
-
(2011)
Proceedings of USENIX Security
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
13
-
-
77954604013
-
Reverse engineering of binary device drivers with RevNIC
-
V. Chipounov and G. Candea. Reverse engineering of binary device drivers with RevNIC. In EuroSys, pages 167-180, 2010.
-
(2010)
EuroSys
, pp. 167-180
-
-
Chipounov, V.1
Candea, G.2
-
14
-
-
84863813576
-
S2E: A platform for in-vivo multi-path analysis of software systems
-
Mar.
-
V. Chipounov, V. Kuznetsov, and G. Candea. S2E: a platform for in-vivo multi-path analysis of software systems. SIGPLAN Not., 46(3):265-278, Mar. 2011.
-
(2011)
SIGPLAN Not.
, vol.46
, Issue.3
, pp. 265-278
-
-
Chipounov, V.1
Kuznetsov, V.2
Candea, G.3
-
15
-
-
79952951099
-
Cloud9: A software testing service
-
Jan.
-
L. Ciortea, C. Zamfir, S. Bucur, V. Chipounov, and G. Candea. Cloud9: a software testing service. SIGOPS Oper. Syst. Rev., 43(4):5-10, Jan. 2010.
-
(2010)
SIGOPS Oper. Syst. Rev.
, vol.43
, Issue.4
, pp. 5-10
-
-
Ciortea, L.1
Zamfir, C.2
Bucur, S.3
Chipounov, V.4
Candea, G.5
-
16
-
-
85076313199
-
-
Last accessed Jun 2013
-
Codenomicon. Codenomicon defensics. http://www.codenomicon.com, 2013. Last accessed Jun 2013.
-
(2013)
Codenomicon Defensics
-
-
-
17
-
-
41149160709
-
Bouncer: Securing software by blocking bad input
-
M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: securing software by blocking bad input. In Symposium on Operating System Principles (SOSP), pages 117-130, 2007.
-
(2007)
Symposium on Operating System Principles (SOSP)
, pp. 117-130
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
19
-
-
78751540482
-
A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan
-
A. Cui and S. J. Stolfo. A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In Annual Computer Security Applications Conference (ACSAC), pages 97-106. ACM, 2010.
-
(2010)
Annual Computer Security Applications Conference (ACSAC)
, pp. 97-106
-
-
Cui, A.1
Stolfo, S.J.2
-
20
-
-
85084162004
-
Security analysis of smartphone point-of-sale systems
-
W. Frisby, B. Moench, B. Recht, and T. Ristenpart. Security analysis of smartphone point-of-sale systems. In Proceedings of the 6th USENIX conference on Offensive Technologies (WOOT), pages 3-3, 2012.
-
(2012)
Proceedings of the 6th USENIX Conference on Offensive Technologies (WOOT)
, pp. 3
-
-
Frisby, W.1
Moench, B.2
Recht, B.3
Ristenpart, T.4
-
21
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy (SP), pages 129-142, 2008.
-
(2008)
IEEE Symposium on Security and Privacy (SP)
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
22
-
-
38349178199
-
Security and privacy for implantable medical devices
-
D. Halperin, T. Kohno, T. Heydt-Benjamin, K. Fu, and W. Maisel. Security and privacy for implantable medical devices. Pervasive Computing, IEEE, 7(1):30-39, 2008.
-
(2008)
Pervasive Computing, IEEE
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.3
Fu, K.4
Maisel, W.5
-
23
-
-
70549096255
-
State joining and splitting for the symbolic execution of binaries
-
T. Hansen, P. Schachte, and H. Søndergaard. State joining and splitting for the symbolic execution of binaries. In Runtime Verification, 9th International Workshop, RV 2009, pages 76-92, 2009.
-
(2009)
Runtime Verification, 9th International Workshop, RV 2009
, pp. 76-92
-
-
Hansen, T.1
Schachte, P.2
Søndergaard, H.3
-
24
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, et al. Experimental security analysis of a modern automobile. In 2010 IEEE Symposium on Security and Privacy, pages 447-462. IEEE, 2010.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
-
25
-
-
84863456769
-
Efficient state merging in symbolic execution
-
V. Kuznetsov, J. Kinder, S. Bucur, and G. Candea. Efficient state merging in symbolic execution. In PLDI, pages 193-204, 2012.
-
(2012)
PLDI
, pp. 193-204
-
-
Kuznetsov, V.1
Kinder, J.2
Bucur, S.3
Candea, G.4
-
27
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In Proceedings of the 19th USENIX conference on Security, 2010.
-
(2010)
Proceedings of the 19th USENIX Conference on Security
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
28
-
-
77954523986
-
Kleenet: Discovering insidious interaction bugs in wireless sensor networks before deployment
-
Stockholm, Sweden, April
-
R. Sasnauskas, O. Landsiedel, M. H. Alizai, C. Weise, S. Kowalewski, and K. Wehrle. Kleenet: Discovering insidious interaction bugs in wireless sensor networks before deployment. In ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Stockholm, Sweden, April 2010.
-
(2010)
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)
-
-
Sasnauskas, R.1
Landsiedel, O.2
Alizai, M.H.3
Weise, C.4
Kowalewski, S.5
Wehrle, K.6
-
29
-
-
85008263148
-
Loop-extended symbolic execution on binary programs
-
P. Saxena, P. Poosankam, S. McCamant, and D. Song. Loop-extended symbolic execution on binary programs. In International Symposium in Software Testing and Analysis (ISSTA), pages 225-236, 2009.
-
(2009)
International Symposium in Software Testing and Analysis (ISSTA)
, pp. 225-236
-
-
Saxena, P.1
Poosankam, P.2
McCamant, S.3
Song, D.4
-
30
-
-
32344447459
-
CUTE: A concolic unit testing engine for C
-
New York, NY, USA ACM
-
K. Sen, D. Marinov, and G. Agha. CUTE: A concolic unit testing engine for C. In Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, ESEC/FSE-13, pages 263-272, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-13
, pp. 263-272
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
33
-
-
85076316763
-
-
Last accessed Jun 2013
-
Texas Instruments. Microcontroller projects website. http://e2e.ti.com/group/microcontrollerprojects/m/msp430microcontrollerprojects/default.aspx. Last accessed Jun 2013.
-
Microcontroller Projects Website
-
-
-
34
-
-
85076303323
-
-
January
-
Texas Instruments. MSP430 for security applications. http://www.ti.com/mcu/docs/mcuorphan.tsp?contentId=33485&DCMP=MSP430&HQS=Other+OT+430security, January 2012.
-
(2012)
MSP430 for Security Applications
-
-
-
35
-
-
85076316029
-
-
Last accessed Jun 2013
-
The Contiki Project. Contiki. http://www.contiki-os.org/. Last accessed Jun 2013.
-
Contiki
-
-
-
36
-
-
77954609085
-
Execution synthesis: A technique for automated software debugging
-
C. Zamfir and G. Candea. Execution synthesis: a technique for automated software debugging. In EuroSys, pages 321-334, 2010.
-
(2010)
EuroSys
, pp. 321-334
-
-
Zamfir, C.1
Candea, G.2
|