Symbolic execution

Results: 153



#Item
111Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2012-03-12 11:18:03
112Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: security.ece.cmu.edu

Language: English - Date: 2011-05-02 14:34:52
113Software testing / Automated theorem proving / Concolic testing / Software metrics / KeY / Symbolic execution / Code coverage / Control flow graph / Algorithm / Software / Computing / Formal methods

Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-03-17 11:29:44
114Symbolic execution / David Brumley / Higher education / Academia / Computer programming / Taint checking / Carnegie Mellon University

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2010-08-16 00:26:51
115Theoretical computer science / Automated theorem proving / Concolic testing / Symbolic execution / KeY / Parallel computing / X86 / Type system / Algorithm / Data types / Formal methods / Computing

Unleashing M AYHEM on Binary Code Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert and David Brumley Carnegie Mellon University Pittsburgh, PA {sangkilc, thanassis, alexandre.rebert, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2012-09-22 22:22:15
116Symbolic execution / David Brumley / Pennsylvania / Higher education / Academia / Computer programming / Taint checking / Carnegie Mellon University

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
117Software engineering / Automated theorem proving / Concolic testing / Symbolic execution / KeY / X86 / Parallel computing / Function / Type system / Mathematics / Computing / Data types

Unleashing Mayhem on Binary Code

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
118Distributed computing / Model checking / File system / Symbolic execution

Symbolic Execution of Distributed Software MEng Final Report Written by Milen Dzhumerov Supervisor: Peter Pietzuch Second Supervisor: Cristian Cadar

Add to Reading List

Source URL: assets.milen.me

Language: English - Date: 2015-03-09 10:58:44
119X86 architecture / Data types / Assembly languages / Decompiler / X86 assembly language / C++ / MOV / X86 / C++ classes / Computer architecture / Computing / Software engineering

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution Tielei Wang† , Tao Wei†∗, Zhiqiang Lin‡ , Wei Zou† † Key Laboratory of Network and Software Security As

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2009-01-16 17:24:00
UPDATE