The DARPA Cyber Grand Challenge: A Competitor's Perspective, Part 2
暂无分享,去创建一个
[1] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[2] Chris Lattner,et al. LLVM: AN INFRASTRUCTURE FOR MULTI-STAGE OPTIMIZATION , 2000 .
[3] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[4] Andrew Wang,et al. On the effectiveness of the metamorphic shield , 2010, ECSA '10.
[5] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[6] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[7] Bhavani M. Thuraisingham,et al. Differentiating Code from Data in x86 Binaries , 2011, ECML/PKDD.
[8] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[9] Jim Alves-Foss,et al. The MILS architecture for high-assurance embedded systems , 2006, Int. J. Embed. Syst..
[10] Thomas Reps,et al. Static Analysis of Software Executables , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[11] Jia Song,et al. HARDWARE SECURITY TAGS FOR ENHANCED OPERATING SYSTEM SECURITY , 2013 .
[12] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.