<--- Back to Details
First PageDocument Content
Theoretical computer science / Computing / Software engineering / Automated theorem proving / Concolic testing / Formal methods / Symbolic execution / Parallel computing / Satisfiability modulo theories / KeY / Symbolic / X86
Date: 2014-05-29 15:38:01
Theoretical computer science
Computing
Software engineering
Automated theorem proving
Concolic testing
Formal methods
Symbolic execution
Parallel computing
Satisfiability modulo theories
KeY
Symbolic
X86

Unleashing Mayhem on Binary Code

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 843,12 KB

Share Document on Facebook

Similar Documents

Embedded systems / Computer hardware / Computing / USB / Electronics / Firmware / Intel MCS-51 / Microcontroller / Human interface device / Computer / USB human interface device class

arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗

DocID: 1xVC4 - View Document

Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

DocID: 1xVzE - View Document

Software engineering / Computing / Computer programming / Cross-platform software / High-level programming languages / Abstract interpretation / Computer science / Symbolic execution / D / Pure / Concolic testing

Multi-Solver Support in Symbolic Execution Hristina Palikareva, Cristian Cadar SMT Workshop 2014, Vienna, 17 July 2014 Dynamic Symbolic Execution

DocID: 1xV4A - View Document

Symbol

Symbolic Execution for a Clash-Free Subset of ASMs ? Gerhard Schellhorna , Gidon Ernsta , J¨org Pf¨ahlera , Stefan Bodenm¨ ullera , a Wolfgang Reif a Institute

DocID: 1xU5v - View Document

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

DocID: 1viNk - View Document