Formal Framework for Reasoning About the Precision of Dynamic Analysis
暂无分享,去创建一个
Roberto Giacobazzi | Mila Dalla Preda | Niccolò Marastoni | M. Preda | R. Giacobazzi | Niccolò Marastoni
[1] Jean-Yves Marion,et al. How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections) , 2019, ACSAC.
[2] Junfeng Yang,et al. NEUZZ: Efficient Fuzzing with Neural Program Smoothing , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[3] S. Byna,et al. DART: distributed adaptive radix tree for efficient affix-based keyword search on HPC systems , 2018, PACT.
[4] Chao Zhang,et al. CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[5] Mila Dalla Preda,et al. Characterizing a property-driven obfuscation strategy , 2017, J. Comput. Secur..
[6] Gilles Barthe,et al. Reasoning about Probabilistic Defense Mechanisms against Remote Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[7] Moritz Contag,et al. Syntia: Synthesizing the Semantics of Obfuscated Code , 2017, USENIX Security Symposium.
[8] Alexander Pretschner,et al. Code obfuscation against symbolic execution attacks , 2016, ACSAC.
[9] Kosta Serebryany,et al. Continuous Fuzzing with libFuzzer and AddressSanitizer , 2016, 2016 IEEE Cybersecurity Development (SecDev).
[10] Moritz Contag,et al. Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows , 2016, DIMVA.
[11] Stefan Katzenbeisser,et al. Protecting Software through Obfuscation , 2016, ACM Comput. Surv..
[12] Roberto Giacobazzi,et al. Maximal incompleteness as obfuscation potency , 2016, Formal Aspects of Computing.
[13] Barbara G. Ryder,et al. A Formal Framework for Program Anomaly Detection , 2015, RAID.
[14] Saumya Debray,et al. A Generic Approach to Automatic Deobfuscation of Executable Code , 2015, 2015 IEEE Symposium on Security and Privacy.
[15] Marco Torchiano,et al. A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques , 2013, Empirical Software Engineering.
[16] Roberto Giacobazzi,et al. Obfuscation by partial evaluation of distorted interpreters , 2012, PEPM '12.
[17] Kevin Coogan,et al. Deobfuscation of virtualization-obfuscated software: a semantics-based approach , 2011, CCS '11.
[18] Stefan Katzenbeisser,et al. Code Obfuscation against Static and Dynamic Reverse Engineering , 2011, Information Hiding.
[19] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[20] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.
[21] Roberto Giacobazzi,et al. Semantics-based code obfuscation by abstract interpretation , 2009, J. Comput. Secur..
[22] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Arie van Deursen,et al. A Systematic Survey of Program Comprehension through Dynamic Analysis , 2008, IEEE Transactions on Software Engineering.
[24] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[25] Roberto Giacobazzi,et al. Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking , 2008, 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods.
[26] Stephen Drape,et al. Slicing obfuscations: design, correctness, and evaluation , 2007, DRM '07.
[27] Stephen Drape,et al. Specifying Imperative Data Obfuscations , 2007, ISC.
[28] Pedram Amini,et al. Fuzzing: Brute Force Vulnerability Discovery , 2007 .
[29] Luciano Baresi,et al. An Introduction to Software Testing , 2006, FoVMT.
[30] Roberto Giacobazzi,et al. Semantic-Based Code Obfuscation by Abstract Interpretation , 2005, ICALP.
[31] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[32] Patrick Cousot,et al. An abstract interpretation-based framework for software watermarking , 2004, POPL.
[33] Susan Elliott Sim,et al. Using benchmarking to advance research: a challenge to software engineering , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[34] Norman Wilde,et al. A comparison of methods for locating features in legacy software , 2003, J. Syst. Softw..
[35] Roberto Giacobazzi,et al. Making abstract interpretations complete , 2000, JACM.
[36] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[37] Patrick Cousot,et al. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation , 2002, MFPS.
[38] Patrick Cousot,et al. Systematic design of program analysis frameworks , 1979, POPL.
[39] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.