Search-Based Concolic Execution for SW Vulnerability Discovery
暂无分享,去创建一个
[1] Rupak Majumdar,et al. Hybrid Concolic Testing , 2007, 29th International Conference on Software Engineering (ICSE'07).
[2] Koushik Sen,et al. Concolic testing , 2007, ASE.
[3] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[4] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[5] David Brumley,et al. Automatic exploit generation , 2014, CACM.
[6] Gary McGraw,et al. Static Analysis for Security , 2004, IEEE Secur. Priv..
[7] Chayanika Sharma,et al. A Survey on Software Testing Techniques using Genetic Algorithm , 2014, ArXiv.
[8] Koushik Sen,et al. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools , 2006, CAV.
[9] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[10] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..