| Document Date: 2013-09-09 05:44:56 Open Document File Size: 162,95 KBShare Result on Facebook
City Heuristic / FIELD / Coverage Vulnerability / / Company Elcano / Symantec / Exploration / Microsoft / / Event FDA Phase / / Facility UC Berkeley Carnegie Mellon University National University of Singapore / / IndustryTerm search space explosion / software vendors / Internet Security Threat Report hundreds / given protocol / search space explosion problem / field constraint chain / legacy systems / software developers / binary analysis infrastructure / constraint chain / exhaustive search / software testing / / NaturalFeature Path Predicate Extractor Stream / / Organization Carnegie Mellon University National University of Singapore / UC Berkeley / / Position path predicate extractor / constraint extractor / Execution trace Protocol parser Message format Constraint extractor / Message format Execution trace Path Predicate Extractor / / Product MD5 / / Technology point Protocol specification Execution Monitor Test result Execution trace Protocol / HTTP / given protocol / level path predicate Field Condition Generator Protocol specification Input Protocol / execution monitor Exploit Program Vulnerability point Protocol / /
SocialTag |