Marie-Laure Potet University of Grenoble VERIMAG Grenoble / Sanjay Rawat∗ University of Grenoble LIG Grenoble / Laurent Mounier University of Grenoble VERIMAG Grenoble / Extended Abstract Gustavo Grieco University of Grenoble VERIMAG Grenoble / /
IndustryTerm
software vulnerabilities / inside software / /
Organization
University of Grenoble LIG Grenoble / Extended Abstract Gustavo Grieco University of Grenoble VERIMAG Grenoble / University of Grenoble VERIMAG Grenoble / /
Person
S. Engle / D. Howard / S. Whalen / M. Bishop / Sanjay Rawat / /
Position
XPLOITABILITY FORMULA GENERATION A. General Approach We present Symbolic Exploit Assistant / stack model for symbolic buffer overflow exploitability analysis / Bishop / /