AEG: Automatic Exploit Generation
暂无分享,去创建一个
David Brumley | Sang Kil Cha | Thanassis Avgerinos | Brent Lim Tze Hao | Thanassis Avgerinos | David Brumley | S. Cha | Brent Lim Tze Hao
[1] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[2] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[3] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[4] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[5] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[6] David A. Wagner,et al. Finding User/Kernel Pointer Bugs with Type Inference , 2004, USENIX Security Symposium.
[7] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[8] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[9] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[10] Benjamin Livshits,et al. Finding Security Vulnerabilities in Java Applications with Static Analysis , 2005, USENIX Security Symposium.
[11] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[12] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[13] Dawson R. Engler,et al. EXE: A system for automatically generating inputs of death using symbolic execution , 2006, CCS 2006.
[14] David L. Dill,et al. A Decision Procedure for Bit-Vectors and Arrays , 2007, CAV.
[15] Dawson R. Engler,et al. Under-constrained execution: making automatic code destruction easy and scalable , 2007, ISSTA '07.
[16] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] Hao Wang,et al. Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures , 2008, IEEE Transactions on Dependable and Secure Computing.
[18] Manuel Costa,et al. Bouncer: securing software by blocking bad input , 2008, WRAITS '08.
[19] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[20] Daniel Kroening,et al. MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities , 2009 .
[21] Richard J. Lipton,et al. Platform-independent programs , 2010, CCS '10.
[22] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[23] David Brumley,et al. Efficient Directionless Weakest Preconditions , 2011 .