Work-in-Progress: DOVE: Pinpointing firmware security vulnerabilities via symbolic control flow assertion mining
暂无分享,去创建一个
[1] Benjamin Müller,et al. The SCIP Optimization Suite 3.2 , 2016 .
[2] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[3] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[4] Xeno Kovah,et al. How Many Million BIOSes Would you Like to Infect? , 2015 .
[5] Olivier Coudert,et al. Verification of Synchronous Sequential Machines Based on Symbolic Execution , 1989, Automatic Verification Methods for Finite State Systems.