Back to Results
First PageMeta Content
Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics


AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract
Add to Reading List

Document Date: 2011-05-02 14:34:52


Open Document

File Size: 344,37 KB

Share Result on Facebook

Company

AEG / /

/

Event

Man-Made Disaster / /

Facility

Library Function Calls / David Brumley Carnegie Mellon University / /

IndustryTerm

Wireless Tools / level algorithm / network support / final solution / file systems / loop exhaustion search strategy / Real-world applications / signature generation algorithms / bug finding infrastructure / struct wireless info info / the basic network / state space search / image-processing utility / search space / /

OperatingSystem

Microsoft Windows / GNU / /

Organization

US Federal Reserve / Carnegie Mellon University / Pittsburgh / /

Person

Brent Lim Tze Hao / Sang Kil Cha / David Brumley Carnegie / /

Position

single interpreter / 1st interpreter / branch interpreter / branch guard / interpreter / 2nd interpreter / symbolic interpreter / programmer / /

ProgrammingLanguage

C / /

ProvinceOrState

Indiana / /

Technology

5.1 Algorithm / HTTP / high-level algorithm / signature generation algorithms / /

SocialTag