Symbolic execution

Results: 153



#Item
71F IE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Benjamin Moench Somesh Jha Thomas Ristenpart

F IE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Benjamin Moench Somesh Jha Thomas Ristenpart

Add to Reading List

Source URL: rist.tech.cornell.edu

Language: English - Date: 2015-07-13 21:30:13
    72Automatically Generating Malicious Disks using Symbolic Execution Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar and Dawson Engler Stanford University Computer Systems Laboratory {junfeng,csar,twohey,cristic,engler}@

    Automatically Generating Malicious Disks using Symbolic Execution Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar and Dawson Engler Stanford University Computer Systems Laboratory {junfeng,csar,twohey,cristic,engler}@

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-03-03 12:25:42
      73Quantification of Software Changes through Probabilistic Symbolic Execution Antonio Filieri1 , Corina S. Păsăreanu2 , and Guowei Yang3 1 2 3

      Quantification of Software Changes through Probabilistic Symbolic Execution Antonio Filieri1 , Corina S. Păsăreanu2 , and Guowei Yang3 1 2 3

      Add to Reading List

      Source URL: snapl.org

      Language: English - Date: 2015-04-08 00:01:43
        74Symbolic Execution of Multithreaded Programs from Arbitrary Program Contexts Tom Bergan Dan Grossman

        Symbolic Execution of Multithreaded Programs from Arbitrary Program Contexts Tom Bergan Dan Grossman

        Add to Reading List

        Source URL: homes.cs.washington.edu

        Language: English - Date: 2014-09-08 13:30:43
        75FiE on Firmware Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Ben Moench Somesh Jha

        FiE on Firmware Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Ben Moench Somesh Jha

        Add to Reading List

        Source URL: wisdom.cs.wisc.edu

        Language: English - Date: 2014-05-19 12:57:29
          76F IE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Benjamin Moench Somesh Jha Thomas Ristenpart

          F IE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Benjamin Moench Somesh Jha Thomas Ristenpart

          Add to Reading List

          Source URL: pages.cs.wisc.edu

          Language: English - Date: 2013-07-04 17:31:41
            77All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution

            All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution

            Add to Reading List

            Source URL: oakland10.cs.virginia.edu

            Language: English - Date: 2010-05-19 11:16:51
              78Reverse Execution With Constraint Solving  Raluca Sauciuc George Necula  Electrical Engineering and Computer Sciences

              Reverse Execution With Constraint Solving Raluca Sauciuc George Necula Electrical Engineering and Computer Sciences

              Add to Reading List

              Source URL: www.cs.berkeley.edu

              Language: English - Date: 2013-05-12 14:29:36
              79Test Generation through Programming in UDITA

              Test Generation through Programming in UDITA

              Add to Reading List

              Source URL: lara.epfl.ch

              Language: English - Date: 2010-02-11 09:29:21
              80SherLog: Error Diagnosis by Connecting Clues from Run-time Logs Ding Yuan Haohui Mai

              SherLog: Error Diagnosis by Connecting Clues from Run-time Logs Ding Yuan Haohui Mai

              Add to Reading List

              Source URL: opera.ucsd.edu

              Language: English - Date: 2010-01-25 16:41:36