Back to Results
First PageMeta Content
Software testing / Error detection and correction / Software bugs / Abstract interpretation / Symbolic execution / Malware / Function / Hash function / Block cipher / Mathematics / Computing / Computer programming


Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam
Add to Reading List

Document Date: 2013-03-28 20:19:28


Open Document

File Size: 242,73 KB

Share Result on Facebook

City

Chicago / /

Company

Identifying Inverse Functions / CBC / Intel / Microsoft / the AES / /

Country

United States / /

Currency

USD / /

/

IndustryTerm

maximum-flow-minimum-cut algorithm / software security / exploration tools / replay server / antivirus tools / breadth-first search / helper tools / bot software / possible applications / generic server / input processing / constraint solution / Internet-in-a-Workstation environment / identification algorithm / potential applications / generic replay server / input generation applications / software bugs / dynamic symbolic execution tools / encryption algorithms / benign software / law enforcement / web interfaces / Internet-in-a-Workstation We / benign applications / layered input processing / /

OperatingSystem

XP / Linux / Ubuntu / Microsoft Windows / /

Organization

Army Research Office / office of Naval Research / National Science Foundation / UC Berkeley / US Federal Reserve / Air Force office of Scientific Research / /

Person

Stephen McCamant / Dawn Song / /

Position

Protection General / /

Product

MegaD / Windows XP / Figure 1 / BitFuzz tool / BitFuzz / /

ProgrammingLanguage

XML / /

ProvinceOrState

Illinois / /

Technology

XML / RAM / encryption algorithms / Linux / block cipher encryption / block cipher / 1 Checksum/hash Algorithm / Operating Systems / identification algorithm / encryption / maximum-flow-minimum-cut algorithm / C&C protocol / DNS / 1307.3 4687.6 84.5 23.1 Decryption Algorithm / MegaD encryption / stream cipher / /

SocialTag