Convicting exploitable software vulnerabilities: An efficient input provenance based approach
暂无分享,去创建一个
[1] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[2] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[3] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[4] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[5] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[6] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[7] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[8] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[9] Nikolai Tillmann,et al. Automating Software Testing Using Program Analysis , 2008, IEEE Software.
[10] Richard Lippmann,et al. Testing static analysis tools using exploitable buffer overflows from open source code , 2004, SIGSOFT '04/FSE-12.
[11] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[12] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[13] Xiangyu Zhang,et al. Experimental evaluation of using dynamic slices for fault location , 2005, AADEBUG'05.
[14] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[15] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[16] Barton P. Miller,et al. An empirical study of the robustness of Windows NT applications using random testing , 2000 .
[17] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[18] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Prof. Dr. Christoph Meinel,et al. Algorithms and Data Structures in VLSI Design , 1998, Springer Berlin Heidelberg.
[20] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[21] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[22] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[23] Xiangyu Zhang,et al. Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams , 2004, Proceedings. 26th International Conference on Software Engineering.
[24] Jørn Lind-Nielsen,et al. BuDDy : A binary decision diagram package. , 1999 .
[25] Joe D. Warren,et al. The program dependence graph and its use in optimization , 1987, TOPL.
[26] Dawson R. Engler,et al. ARCHER: using symbolic, path-sensitive analysis to detect memory access errors , 2003, ESEC/FSE-11.