All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
暂无分享,去创建一个
[1] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[2] Tzi-cker Chiueh,et al. A General Dynamic Information Flow Tracking Framework for Security Applications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[3] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[4] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[5] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[6] Patrice Godefroid,et al. Compositional dynamic test generation , 2007, POPL '07.
[7] Thomas W. Reps,et al. WYSINWYX: What You See Is Not What You eXecute , 2005, VSTTE.
[8] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] Zhenkai Liang,et al. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation , 2007, USENIX Security Symposium.
[10] Dawson R. Engler,et al. EXE: A system for automatically generating inputs of death using symbolic execution , 2006, CCS 2006.
[11] Edsger W. Dijkstra,et al. A Discipline of Programming , 1976 .
[12] Steve Hanna,et al. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications , 2010, NDSS.
[13] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[14] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[15] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[16] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[17] Rupak Majumdar,et al. Dynamic test input generation for database applications , 2007, ISSTA '07.
[18] Manuel Costa,et al. Bouncer: securing software by blocking bad input , 2008, WRAITS '08.
[19] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[20] David L. Dill,et al. A Decision Procedure for Bit-Vectors and Arrays , 2007, CAV.
[21] Dawson R. Engler,et al. Execution Generated Test Cases: How to Make Systems Code Crash Itself , 2005, SPIN.
[22] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[23] Hao Wang,et al. Creating Vulnerability Signatures Using Weakest Preconditions , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[24] Alessandro Orso,et al. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks , 2006, SIGSOFT '06/FSE-14.
[25] Andrew W. Appel,et al. Modern Compiler Implementation in ML , 1997 .
[26] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[27] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[28] Joe D. Warren,et al. The program dependence graph and its use in optimization , 1984, TOPL.
[29] Cormac Flanagan,et al. Avoiding exponential explosion: generating compact verification conditions , 2001, POPL '01.
[30] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[31] Stephen McCamant,et al. Measuring channel capacity to distinguish undue influence , 2009, PLAS '09.
[32] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[33] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[34] Zhenkai Liang,et al. BitScope: Automatically Dissecting Malicious Binaries , 2007 .
[35] Sergey Berezin,et al. CVC Lite: A New Implementation of the Cooperating Validity Checker Category B , 2004, CAV.
[36] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[37] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[38] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[39] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[40] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.
[41] Patrice Godefroid,et al. Active property checking , 2008, EMSOFT '08.
[42] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[43] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[44] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[45] Dawn Xiaodong Song,et al. Limits of Learning-based Signature Generation with Adversaries , 2008, NDSS.
[46] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, SIGP.
[47] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[48] Adam Kiezun,et al. Grammar-based whitebox fuzzing , 2008, PLDI '08.
[49] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[50] Michael Franz,et al. Dynamic taint propagation for Java , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[51] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[52] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[53] Christopher Krügel,et al. Automatic Network Protocol Analysis , 2008, NDSS.
[54] Calvin Lin,et al. Efficient and extensible security enforcement using dynamic data flow analysis , 2008, CCS.
[55] R. Sekar. An Efficient Black-box Technique for Defeating Web Application Attacks , 2009, NDSS.
[56] Zhenkai Liang,et al. Automatically Identifying Trigger-based Behavior in Malware , 2008, Botnet Detection.
[57] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[58] Hao Wang,et al. Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures , 2008, IEEE Transactions on Dependable and Secure Computing.
[59] David Brumley,et al. Efficient Directionless Weakest Preconditions , 2011 .
[60] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[61] Alexander Aiken,et al. A theory of type qualifiers , 1999, PLDI '99.
[62] Dawson R. Engler,et al. RWset: Attacking Path Explosion in Constraint-Based Test Generation , 2008, TACAS.
[63] K. Rustan M. Leino,et al. Efficient weakest preconditions , 2005, Inf. Process. Lett..