Back to Results
First PageMeta Content
Software quality / Software testing / Shellcode / Buffer overflow / Arbitrary code execution / Heap overflow / Address space layout randomization / Fuzz testing / Return-to-libc attack / Computer security / Cyberwarfare / Software bugs


doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle
Add to Reading List

Document Date: 2014-05-29 15:38:01


Open Document

File Size: 4,15 MB

Share Result on Facebook

Company

Adobe / Microsoft / /

Event

Product Release / /

Facility

Carnegie Mellon University / /

IndustryTerm

real systems / generational search / Web servers / software model checking / predefined path-selection algorithm / real software / research / call site / obvious offensive computing implications / large applications / depth-first search / defensive tool / search procedure / Web vulnerabilities / Web browser / cryptographic co-processor / safety-critical systems / software developers / breadth-first search / media players / security-critical software bugs / 32b processors / media applications / search space / Internet Explorer / software verification / /

Movie

The second line / /

OperatingSystem

Unix / Windows 7 / Linux / Ubuntu / Microsoft Windows / /

Organization

Carnegie Mellon University / /

Person

David Brumley / Sang Kil Cha / Edward J. Schwartz / Alexandre Rebert / /

/

Position

TCP/IP driver / programmer / /

Product

Mayhem12 / Mayhem / Mayhem AEG tool / Mayhem / a tool and set of techniques for AEG on executable code / Mayhem AEG / /

ProgrammingLanguage

Java / PHP / C / C++ / /

RadioStation

12 With / /

Technology

PHP / Java / cryptographic co-processor / Unix / Linux / API / caching / 32b processors / operating system / operating systems / predefined path-selection algorithm / TCP/IP / /

SocialTag