Symbolic execution

Results: 153



#Item
91Quantifying Information Leaks using Reliability Analysis † ˘ areanu ˘ Quoc-Sang Phan∗ Pasquale Malacaria∗ Corina S. Pas Marcelo d’Amorim‡

Quantifying Information Leaks using Reliability Analysis † ˘ areanu ˘ Quoc-Sang Phan∗ Pasquale Malacaria∗ Corina S. Pas Marcelo d’Amorim‡

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-04-10 18:09:41
92Symbolic Execution as DPLL Modulo Theories Quoc-Sang Phan Queen Mary University of London   Abstract

Symbolic Execution as DPLL Modulo Theories Quoc-Sang Phan Queen Mary University of London Abstract

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-04-10 18:09:41
93Self-composition by Symbolic Execution Quoc-Sang Phan Queen Mary University of London   Abstract

Self-composition by Symbolic Execution Quoc-Sang Phan Queen Mary University of London Abstract

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-04-10 18:09:41
    94Statistical Symbolic Execution with Informed Sampling ˘ areanu ˘ Corina S. Pas Carnegie Mellon Silicon Valley, NASA Ames

    Statistical Symbolic Execution with Informed Sampling ˘ areanu ˘ Corina S. Pas Carnegie Mellon Silicon Valley, NASA Ames

    Add to Reading List

    Source URL: www.iste.uni-stuttgart.de

    Language: English - Date: 2014-04-10 17:58:00
    95DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

    DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    9615 Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution TIELEI WANG and TAO WEI, Peking University GUOFEI GU, Texas A&M University WEI ZOU, Peking University

    15 Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution TIELEI WANG and TAO WEI, Peking University GUOFEI GU, Texas A&M University WEI ZOU, Peking University

    Add to Reading List

    Source URL: lenx.100871.net

    Language: English
    97Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA  {jnewsome,

    Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    98Puzzle-Based Automatic Testing: Bringing Humans into the Loop by Solving Puzzles Ning Chen and Sunghun Kim The Hong Kong University of Science and Technology Hong Kong, China

    Puzzle-Based Automatic Testing: Bringing Humans into the Loop by Solving Puzzles Ning Chen and Sunghun Kim The Hong Kong University of Science and Technology Hong Kong, China

    Add to Reading List

    Source URL: www.cse.ust.hk

    Language: English - Date: 2012-09-07 00:53:22
    99Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

    Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28