Symbolic execution

Results: 153



#Item
101Software testing / Error detection and correction / Software bugs / Abstract interpretation / Symbolic execution / Malware / Function / Hash function / Block cipher / Mathematics / Computing / Computer programming

Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
102Dataflow / Symbolic execution / Algorithm / Information flow / Dependence analysis / Pointer / Information / Taint checking / Computing / Software engineering / Parallel computing

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
103Predicate transformer semantics / Program logic / KeY / IP / Function / Algorithm / NP / Symbolic execution / Communications protocol / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
104Database trigger / Trigger / Computer virus / Pointer / Computing / Software engineering / Computer programming / Abstract interpretation / Symbolic execution / Malware

1 Automatically Identifying Trigger-based Behavior in Malware David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin Carnegie Mellon University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
105Computer security / Hacking / Computer network security / Vulnerability / Communications protocol / Social vulnerability / Symbolic execution / Intrusion prevention system / Parsing / Computing / Software testing / Cyberwarfare

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
106Symbolic execution / Software engineering / Programming language implementation / Malware / Algorithm / Assembly language / KeY / Computer program / Software bug / Computing / Formal methods / Abstract interpretation

BitScope: Automatically Dissecting Malicious Binaries David Brumley, Cody Hartwig, Min Gyung Kang, Zhenkai Liang James Newsome, Pongsin Poosankam, Dawn Song, Heng Yin March 18, 2007 Last Modified: May 23, 2007 CMU-CS-07-

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
107Predicate transformer semantics / Program logic / KeY / IP / NP / Symbolic execution / PP / Algorithm / Function / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
108Software testing / Automated theorem proving / Concolic testing / Software metrics / KeY / Symbolic execution / Code coverage / Control flow graph / Algorithm / Software / Computing / Formal methods

Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
109Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
110Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE