<--- Back to Details
First PageDocument Content
Software / Computing / System software / Boot loaders / BIOS / Rootkits / System Management Mode / Concolic testing / Symbolic execution / Unified Extensible Firmware Interface / QEMU / Software testing
Date: 2016-02-21 20:25:08
Software
Computing
System software
Boot loaders
BIOS
Rootkits
System Management Mode
Concolic testing
Symbolic execution
Unified Extensible Firmware Interface
QEMU
Software testing

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

Add to Reading List

Source URL: www.usenix.org

Download Document from Source Website

File Size: 400,47 KB

Share Document on Facebook

Similar Documents

Cluster Deployment and Dynamic Partitionning with  Kadeploy and KaVLAN Emmanuel Jeanvoine, Nicolas Niclausse, Lucas Nussbaum and David Margery KaVLAN – network isolation

Cluster Deployment and Dynamic Partitionning with Kadeploy and KaVLAN Emmanuel Jeanvoine, Nicolas Niclausse, Lucas Nussbaum and David Margery KaVLAN – network isolation

DocID: 1r9XZ - View Document

Zeroshell as TFTP server On June 22 a new update has been released by Fulvio BF22 (June 30, 2013) So now you can install an thin client or a server on network. I was playing with booting SmartOS [www.smartos.org] and ste

Zeroshell as TFTP server On June 22 a new update has been released by Fulvio BF22 (June 30, 2013) So now you can install an thin client or a server on network. I was playing with booting SmartOS [www.smartos.org] and ste

DocID: 1qDZ5 - View Document

PVS Boot Process Poster v1-5.pdf

PVS Boot Process Poster v1-5.pdf

DocID: 1qkXg - View Document

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

DocID: 1q1wA - View Document

Network Working Group Request for Comments: 783 K. R. Sollins MIT June, 1981

Network Working Group Request for Comments: 783 K. R. Sollins MIT June, 1981

DocID: 1pO0H - View Document