-
1
-
-
85076917729
-
-
August
-
Busybox. www.busybox.net, August 2008.
-
(2008)
-
-
-
2
-
-
85076896548
-
-
August
-
Coreutils. www.gnu.org/software/coreutils, August 2008.
-
(2008)
-
-
-
3
-
-
77956563021
-
-
1003.1, edition. May 2008
-
IEEE Std 1003.1, 2004 edition. www.unix.org/version3/ ieee std.html, May 2008.
-
(2004)
IEEE Std
-
-
-
4
-
-
85076925013
-
-
August
-
MINIX 3. www.minix3.org, August 2008.
-
(2008)
-
-
-
5
-
-
72849149691
-
-
March
-
SecurityFocus, www.securityfocus.com, March 2008.
-
(2008)
SecurityFocus
-
-
-
6
-
-
85076884310
-
-
May
-
uCLibc. www.uclibc.org, May 2008.
-
(2008)
-
-
-
9
-
-
57449083130
-
Finding bugs in dynamic web applications
-
ARTZI, S., KIEZUN , A., DOLBY, J., TIP, F., DIG, D., PARADKAR, A., AND ERNST, M. D. Finding bugs in dynamic web applications. In Proceedings of the International Symposium on Software Testing and Analysis (ISSTA 2008).
-
Proceedings of the International Symposium on Software Testing and Analysis (ISSTA 2008)
-
-
Artzi, S.1
Kiezun, A.2
Dolby, J.3
Tip, F.4
Dig, D.5
Paradkar, A.6
Ernst, M.D.7
-
12
-
-
84960853881
-
Model checking programs
-
BRAT, G., HAVELUND, K., PARK, S., AND VISSER, W. Model checking programs. In IEEE International Conference on Automated Software Engineering (ASE 2000).
-
IEEE International Conference on Automated Software Engineering (ASE 2000)
-
-
Brat, G.1
Havelund, K.2
Park, S.3
Visser, W.4
-
13
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
BRUMLEY, D., CABALLERO, J., LIANG, Z., NEWSOME, J., AND SONG, D. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In Proceedings of USENIX Security Symposium (USENIX Security 2007).
-
Proceedings of USENIX Security Symposium (USENIX Security 2007)
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song, D.5
-
14
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
BRUMLEY, D., NEWSOME, J., SONG, D., WANG, H., AND JHA, S. Towards automatic generation of vulnerability-based signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (IEEE S&P 2006).
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (IEEE S&P
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
16
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
CADAR, C., GANESH, V., PAWLOWSKI, P., DILL, D., AND ENGLER, D. EXE: Automatically generating inputs of death. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006).
-
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006)
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
19
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
CORBETT, J., DWYER, M., HATCLIFF, J., LAUBACH, S., PASAREANU, C., ROBBY, AND ZHENG, H. Bandera: Extracting finite-state models from Java source code. In Proceedings of the International Conference on Software Engineering (ICSE 2000).
-
Proceedings of the International Conference on Software Engineering (ICSE 2000)
-
-
Corbett, J.1
Dwyer, M.2
Hatcliff, J.3
Laubach, S.4
Pasareanu, C.5
Robby6
Zheng, H.7
-
20
-
-
70450092967
-
Bouncer: Securing software by blocking bad input
-
COSTA, M., CASTRO, M., ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: Securing software by blocking bad input. In Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP 2007).
-
Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP 2007)
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
21
-
-
33845391802
-
Vigilante: End-to-end containment of Internet worms
-
COSTA, M., CROWCROFT, J., CASTRO, M., ROWSTRON, A., ZHOU, L., ZHANG, L., AND BARHAM, P. Vigilante: end-to-end containment of Internet worms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005).
-
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
30
-
-
18944390941
-
The model checker SPIN
-
HOLZMANN, G. J. The model checker SPIN. Software Engineering 23, 5 (1997), 279-295.
-
(1997)
Software Engineering
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
35
-
-
0003577356
-
-
Tech. rep., University of Wisconsin Madison
-
MILLER, B., KOSKI, D., LEE, C. P., MAGANTY, V., MURTHY, R., NATARAJAN, A., AND STEIDL, J. Fuzz revisited: A reexamination of the reliability of UNIX utilities and services. Tech. rep., University of Wisconsin - Madison, 1995.
-
(1995)
Fuzz Revisited: A Reexamination of the Reliability of UNIX Utilities and Services
-
-
Miller, B.1
Koski, D.2
Lee, C.P.3
Maganty, V.4
Murthy, R.5
Natarajan, A.6
Steidl, J.7
-
38
-
-
79952139838
-
Explode: A lightweight, general system for finding serious storage system errors
-
YANG, J., SAR, C., AND ENGLER, D. eXplode: a lightweight, general system for finding serious storage system errors. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI 2006).
-
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI 2006)
-
-
Yang, J.1
Sar, C.2
Engler, D.3
-
39
-
-
84888352157
-
Making information flow explicit in HiStar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIÈRES, D. Making information flow explicit in HiStar. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI 2006).
-
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI 2006)
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|