Back to Results
First PageMeta Content
Information / Communications protocol / Finite-state machine / Algorithm / Mealy machine / Function / Output / Model checking / Models of computation / Mathematics / Data


MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery Chia Yuan Cho†‡ Kevin Zhijie Chen† † University of California, Berkeley
Add to Reading List

Document Date: 2013-03-28 20:19:28


Open Document

File Size: 301,60 KB

Share Result on Facebook

Company

CNF / DSO National Labs / Intel / Microsoft / /

Event

FDA Phase / /

Facility

University of California / /

IndustryTerm

analyzed server applications / search process / secure systems / analyzed software / remote desktop applications / search progresses / re-computing responses / search-space pruning lemmas / software security / communication protocol / important input processing events / possible applications / software systems / model checking tools / search-space / abstract software models / inference algorithm / semi-formal hardware test generation tools / Black box inference algorithms / server applications / flat search-space / online learning algorithm / symbolic execution search process / finite-state machine inference algorithm / search space / software community / learning algorithm / web services / /

OperatingSystem

Unix / Linux / Windows XP / Microsoft Windows / /

Organization

UC Berkeley / University of California / Berkeley / Carnegie Mellon University / /

Person

Mi / Yuan Cho / Kevin Zhijie Chen / Edward XueJun / /

Position

abstract model / and repeat the process / model / abstract model / model / while the model guides further search / /

Product

Samba 3.3.4 / Vino 2.26.1 / SMB / /

ProgrammingLanguage

L / /

ProvinceOrState

California / /

Technology

Unix / Linux / Synergy algorithm / inference algorithm / Xeon processors / encryption / online learning algorithm / finite state machine / key technology / communication protocol / SMB protocol / finite-state machine inference algorithm / Black box inference algorithms / caching / simulation / same protocol / L∗ algorithm / RFB protocol / network protocols / GUI / /

URL

http /

SocialTag