-
2
-
-
85077677655
-
-
Bitscope. http://www.cs.cmu.edu/~chartwig/bitscope.
-
Bitscope
-
-
-
3
-
-
85077681973
-
-
IrcFuzz. http://www.digitaldwarf.be/products/ircfuzz.c.
-
IrcFuzz
-
-
-
5
-
-
85077694132
-
-
JBroFuzz. http://www.owasp.org/index.php/Category:OWASP\_JBroFuzz.
-
JBroFuzz
-
-
-
6
-
-
85077695828
-
-
MangleMe. http://lcamtuf.coredump.cx.
-
MangleMe
-
-
-
7
-
-
85077699204
-
-
NetTime. http://nettime.sourceforge.net.
-
NetTime
-
-
-
8
-
-
85077675314
-
-
Nmap. http://www.insecure.org.
-
Nmap
-
-
-
9
-
-
85077712973
-
-
Peach. http://peachfuzz.sourceforge.net.
-
Peach
-
-
-
11
-
-
85077704259
-
-
Queso. http://ftp.cerias.purdue.edu/pub/tools/unix/scanners/queso.
-
Queso
-
-
-
12
-
-
85077676818
-
-
Spike. http://www.immunitysec.com/resources-freesoftware.shtml.
-
Spike
-
-
-
13
-
-
85077677569
-
-
Windows NTP server. http://www.ee.udel.edu/~mills/ntp/html/build/hints/winnt.html.
-
Windows NTP Server
-
-
-
15
-
-
85077694342
-
-
Xprobe. http://www.sys-security.com.
-
Xprobe
-
-
-
17
-
-
34548772699
-
-
Tech. Rep. CMU-CS-07-105, Carnegie Mellon University School of Computer Science
-
BRUMLEY, D., HARTWIG, C., LIANG, Z., NEWSOME, J., SONG, D., AND YIN, H. Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis. Tech. Rep. CMU-CS-07-105, Carnegie Mellon University School of Computer Science, 2007.
-
(2007)
Towards Automatically Identifying Trigger-Based Behavior in Malware Using Symbolic Execution and Binary Analysis
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
18
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
BRUMLEY, D., NEWSOME, J., SONG, D., W., H., AND JHA, S. Towards automatic generation of vulnerability-based signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006).
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.W.H.3
Jha, S.4
-
19
-
-
35048885595
-
Creating vulnerability signatures using weakest pre-conditions
-
BRUMLEY, D., WANG, H., JHA, S., AND SONG, D. Creating vulnerability signatures using weakest pre-conditions. In Proceedings of the 2007 Symposium on Computer Security Foundations Symposium (2007).
-
(2007)
Proceedings of the 2007 Symposium on Computer Security Foundations Symposium
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
20
-
-
85038902950
-
Fig: Automatic fingerprint generation
-
CABALLERO, J., VENKATARAMAN, S., POOSANKAM, P., KANG, M. G., SONG, D., AND BLUM, A. Fig: Automatic fingerprint generation. In 14th Annual Network and Distributed System Security Conference (NDSS) (2007).
-
(2007)
14th Annual Network and Distributed System Security Conference (NDSS)
-
-
Caballero, J.1
Venkataraman, S.2
Poosankam, P.3
Kang, M.G.4
Song, D.5
Blum, A.6
-
21
-
-
50249118032
-
EXE: A system for automatically generating inputs of death using symbolic execution
-
CADAR, C., GANESH, V., PAWLOWSKI, P., DILL, D., AND ENGLER, D. EXE: A system for automatically generating inputs of death using symbolic execution. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS) (2006).
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS)
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
22
-
-
0038601527
-
Modular verification of software components in C
-
CHAKI, S., CLARKE, E., GROCE, A., JHA, S., AND VEITH, H. Modular verification of software components in C. In Proceedings of the 25th International Conference on Software Engineering (ICSE)(2003).
-
(2003)
Proceedings of the 25th International Conference on Software Engineering (ICSE)
-
-
Chaki, S.1
Clarke, E.2
Groce, A.3
Jha, S.4
Veith, H.5
-
27
-
-
0003415244
-
-
June Updated by RFC 2817
-
FIELDING, R., GETTYS, J., MOGUL, J., FRYSTYK, H., MASINTER, L., LEACH, P., AND BERNERS-LEE, T. Hypertext Transfer Protocol – HTTP/1.1. RFC 2616 (Draft Standard), June 1999. Updated by RFC 2817.
-
(1999)
Hypertext Transfer Protocol – HTTP/1.1. RFC 2616 (Draft Standard)
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
28
-
-
0036036098
-
Estended static checking for java
-
FLANAGAN, C., LEINO, K. R. M., LILLIBRIDGE, M., NELSON, G., SAXE, J. B., AND STATA, R. Estended static checking for Java. In ACM Conference on the Programming Language Design and Implementation (PLDI) (2002).
-
(2002)
ACM Conference on the Programming Language Design and Implementation (PLDI)
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
34
-
-
0016971687
-
Symbolic execution and program testing
-
KING, J. Symbolic execution and program testing. Communications of the ACM 19 (1976), 386–394.
-
(1976)
Communications of the ACM
, vol.19
, pp. 386-394
-
-
King, J.1
-
35
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
KRUEGEL, C., KIRDA, E., MUTZ, D., ROBERTSON, W., AND VIGNA, G. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th USENIX Security Symposium (2005).
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
36
-
-
13844267476
-
Efficient weakest preconditions
-
LEINO, K. R. M. Efficient weakest preconditions. Information Processing Letters 93, 6 (2005), 281–288.
-
(2005)
Information Processing Letters
, vol.93
, Issue.6
, pp. 281-288
-
-
Leino, K.R.M.1
-
41
-
-
84978435516
-
CMC: A pragmatic approach to model checking real code
-
MUSUVATHI, M., PARK, D. Y., CHOU, A., ENGLER, D. R.,, AND DILL, D. L. CMC: A pragmatic approach to model checking real code. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI) (2002).
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Musuvathi, M.1
Park, D.Y.2
Chou, A.3
Engler, D.R.4
Dill, D.L.5
-
43
-
-
17444400103
-
Violating assumptions with fuzzing
-
OEHLERT, P. Violating assumptions with fuzzing. IEEE Security and Privacy Magazine 3, 2 (2005), 58 – 62.
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.2
, pp. 58-62
-
-
Oehlert, P.1
-
44
-
-
0000579968
-
Automated packet trace analysis of TCP implementations
-
PAXSON, V. Automated packet trace analysis of TCP implementations. In ACM SIGCOMM 1997 (1997).
-
(1997)
ACM SIGCOMM 1997
-
-
Paxson, V.1
-
46
-
-
34250013666
-
Integrated TCP/IP protocol software testing for vulnerability detection
-
XIAO, S., DENG, L., LI, S., AND WANG, X. Integrated tcp/ip protocol software testing for vulnerability detection. In Proceedgins of International Conference on Computer Networks and Mobile Computing (2003).
-
(2003)
Proceedgins of International Conference on Computer Networks and Mobile Computing
-
-
Xiao, S.1
Deng, L.2
Li, S.3
Wang, X.4
-
47
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
YANG, J., SAR, C., TWOHEY, P., CADAR, C., AND ENGLER, D. Automatically generating malicious disks using symbolic execution. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006).
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
|