<--- Back to Details
First PageDocument Content
Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics
Date: 2013-03-28 20:19:28
Software testing
Predicate transformer semantics
Program logic
Fuzz testing
X Window System
Function
KeY
Errors and residuals in statistics
Network Time Protocol
Statistics
Software
Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Download Document from Source Website

File Size: 161,02 KB

Share Document on Facebook

Similar Documents

zzuf – multiple purpose fuzzer  input fuzz testing ●  The idea

zzuf – multiple purpose fuzzer input fuzz testing ● The idea

DocID: 1uxVs - View Document

Automated Whitebox Fuzz Testing Patrice Godefroid Microsoft (Research)   Michael Y. Levin

Automated Whitebox Fuzz Testing Patrice Godefroid Microsoft (Research) Michael Y. Levin

DocID: 1twqB - View Document

MDISS TECHNICAL WHITE PAPER SERIES FUZZ TESTING: IMPROVING MEDICAL DEVICE QUALITY AND SAFETY MDISS and Codenomicon: Fuzz Testing Copyright © 2012, Codenomicon. All rights reserved.

MDISS TECHNICAL WHITE PAPER SERIES FUZZ TESTING: IMPROVING MEDICAL DEVICE QUALITY AND SAFETY MDISS and Codenomicon: Fuzz Testing Copyright © 2012, Codenomicon. All rights reserved.

DocID: 1s69p - View Document

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

DocID: 1rjKP - View Document

Fuzzing  Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

DocID: 1ri8B - View Document