Symbolic execution

Results: 153



#Item
31All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

- Date: 2014-05-29 15:38:01
    32Automatically Generating Malicious Disks using Symbolic Execution Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar and Dawson Engler Stanford University Computer Systems Laboratory {junfeng,csar,twohey,cristic,engler}@

    Automatically Generating Malicious Disks using Symbolic Execution Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar and Dawson Engler Stanford University Computer Systems Laboratory {junfeng,csar,twohey,cristic,engler}@

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    - Date: 2016-03-08 07:04:45
      33RWset: Attacking Path Explosion in Constraint-Based Test Generation Cristian Cadar, Peter Boonstoppel, Dawson Engler TACAS 2008, Budapest, Hungary ETAPS 2008

      RWset: Attacking Path Explosion in Constraint-Based Test Generation Cristian Cadar, Peter Boonstoppel, Dawson Engler TACAS 2008, Budapest, Hungary ETAPS 2008

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2016-03-08 07:04:46
      34All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution

      All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution

      Add to Reading List

      Source URL: oakland31.cs.virginia.edu

      Language: English - Date: 2010-05-19 11:16:51
      35Partial Orders for Efficient Bounded Model Checking of Concurrent Software? Jade Alglave1 , Daniel Kroening2 , and Michael Tautschnig3 1  3

      Partial Orders for Efficient Bounded Model Checking of Concurrent Software? Jade Alglave1 , Daniel Kroening2 , and Michael Tautschnig3 1 3

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English
      36Online Testing of Federated and Heterogeneous Distributed Systems Marco Canini, Vojin Jovanovi´c, Daniele Venzano, Dejan Novakovi´c, and Dejan Kosti´c School of Computer and Communication Sciences, EPFL, Switzerland {

      Online Testing of Federated and Heterogeneous Distributed Systems Marco Canini, Vojin Jovanovi´c, Daniele Venzano, Dejan Novakovi´c, and Dejan Kosti´c School of Computer and Communication Sciences, EPFL, Switzerland {

      Add to Reading List

      Source URL: conferences.sigcomm.org

      Language: English - Date: 2011-08-01 22:52:33
      37doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

      doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      38Unleashing Mayhem on Binary Code

      Unleashing Mayhem on Binary Code

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      39Statically Validating Must Summaries for Incremental Compositional Dynamic Test Generation Patrice Godefroid1 , Shuvendu K. Lahiri1 , and Cindy Rubio-Gonz´alez2 1 2

      Statically Validating Must Summaries for Incremental Compositional Dynamic Test Generation Patrice Godefroid1 , Shuvendu K. Lahiri1 , and Cindy Rubio-Gonz´alez2 1 2

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2014-11-10 23:12:58
      40Bouncer: Securing Software by Blocking Bad Input Manuel Costa Miguel Castro  Microsoft Research

      Bouncer: Securing Software by Blocking Bad Input Manuel Costa Miguel Castro Microsoft Research

      Add to Reading List

      Source URL: www.sosp2007.org

      Language: English - Date: 2016-06-15 13:09:51