-
1
-
-
47249150568
-
Demand-driven compositional symbolic execution
-
Mar
-
S. Anand, P. Godefroid, and N. Tillmann. Demand-driven compositional symbolic execution. In Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, volume 4963 of Lecture Notes in Computer Science, pages 367-381. Mar. 2008.
-
(2008)
Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, volume 4963 of Lecture Notes in Computer Science
, pp. 367-381
-
-
Anand, S.1
Godefroid, P.2
Tillmann, N.3
-
4
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
5
-
-
76649114637
-
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration
-
J. Caballero, Z. Liang, P. Poosankam, and D. Song. Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration. In Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, volume 5758 of Lecture Notes in Computer Science, pages 161-181. 2009.
-
(2009)
Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, volume 5758 of Lecture Notes in Computer Science
, pp. 161-181
-
-
Caballero, J.1
Liang, Z.2
Poosankam, P.3
Song, D.4
-
7
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
Nov
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: Automatically generating inputs of death. In 13th ACM Conference on Computer and Communications Security, Nov. 2006.
-
(2006)
13th ACM Conference on Computer and Communications Security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P. M.3
Dill, D. L.4
Engler, D. R.5
-
9
-
-
41149124878
-
Secure web applications via automatic partitioning
-
Oct
-
S. Chong, J. Liu, A. C. Myers, X. Qi, N. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In 21st ACM Symposium on Operating Systems Principles, pages 31-44, Oct. 2007.
-
(2007)
21st ACM Symposium on Operating Systems Principles
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A. C.3
Qi, X.4
Vikram, N.5
Zheng, L.6
Zheng, X.7
-
10
-
-
11244251956
-
Is runtime verification applicable to cheat detection?
-
Aug
-
M. DeLap, B. Knutsson, H. Lu, O. Sokolsky, U. Sammapun, I. Lee, and C. Tsarouchis. Is runtime verification applicable to cheat detection? In 3rd ACM SIGCOMM Workshop on Network and System Support for Games, Aug. 2004.
-
(2004)
3rd ACM SIGCOMM Workshop on Network and System Support for Games
-
-
DeLap, M.1
Knutsson, B.2
Lu, H.3
Sokolsky, O.4
Sammapun, U.5
Lee, I.6
Tsarouchis, C.7
-
22
-
-
35248821244
-
Hiding intrusions: From the abnormal to the normal and beyond
-
K. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In Information Hiding, 5th International Workshop, IH 2002, pages 1-17, 2003.
-
(2003)
Information Hiding, 5th International Workshop, IH 2002
, pp. 1-17
-
-
Tan, K.1
McHugh, J.2
Killourhy, K.3
-
24
-
-
0020494998
-
Algorithms for approximate string matching
-
Mar
-
E. Ukkonen. Algorithms for approximate string matching. Information and Control, 64(1-3), Mar. 1985.
-
(1985)
Information and Control
, vol.64
, Issue.1-3
-
-
Ukkonen, E.1
-
26
-
-
85052274594
-
Green: reducing, reusing and recycling constraints in program analysis
-
W. Visser, J. Geldenhuys, and M. B. Dwyer. Green: reducing, reusing and recycling constraints in program analysis. In 20th ACM International Symposium on the Foundations of Software Engineering, FSE, pages 58:1-11, 2012.
-
(2012)
20th ACM International Symposium on the Foundations of Software Engineering, FSE
, vol.58
, pp. 1-11
-
-
Visser, W.1
Geldenhuys, J.2
Dwyer, M. B.3
-
32
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
May
-
J. Yang, C. Sar, P. Twohey, C. Cadar, and D. Engler. Automatically generating malicious disks using symbolic execution. In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
-
33
-
-
77949705456
-
SherLog: Error diagnosis by connecting clues from run-time logs
-
Mar
-
D. Yuan, H. Mai, W. Xiong, L. Tan, Y. Zhou, and S. Pasupathy. SherLog: Error diagnosis by connecting clues from run-time logs. In 15th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 143-154, Mar. 2010.
-
(2010)
15th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 143-154
-
-
Yuan, D.1
Mai, H.2
Xiong, W.3
Tan, L.4
Zhou, Y.5
Pasupathy, S.6
-
34
-
-
77954609085
-
Execution synthesis: a technique for automated software debugging
-
Apr
-
C. Zamfir and G. Candea. Execution synthesis: a technique for automated software debugging. In 5th European Conference on Computer Systems, pages 321-334, Apr. 2010.
-
(2010)
5th European Conference on Computer Systems
, pp. 321-334
-
-
Zamfir, C.1
Candea, G.2
|