<--- Back to Details
First PageDocument Content
Computing / Software engineering / Computer programming / Software bugs / Arbitrary code execution / Program slicing / Instruction set / Vulnerability / Buffer overflow / Symbolic execution / Operand / Assembly language
Date: 2016-06-15 13:09:51
Computing
Software engineering
Computer programming
Software bugs
Arbitrary code execution
Program slicing
Instruction set
Vulnerability
Buffer overflow
Symbolic execution
Operand
Assembly language

Bouncer: Securing Software by Blocking Bad Input Manuel Costa Miguel Castro Microsoft Research

Add to Reading List

Source URL: www.sosp2007.org

Download Document from Source Website

File Size: 234,79 KB

Share Document on Facebook

Similar Documents

arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗

arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗

DocID: 1xVC4 - View Document

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry  of Education Key Lab for Intelligent Netw

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

DocID: 1xVzE - View Document

Multi-Solver Support in Symbolic Execution Hristina Palikareva, Cristian Cadar SMT Workshop 2014, Vienna, 17 July 2014  Dynamic Symbolic Execution

Multi-Solver Support in Symbolic Execution Hristina Palikareva, Cristian Cadar SMT Workshop 2014, Vienna, 17 July 2014 Dynamic Symbolic Execution

DocID: 1xV4A - View Document

Symbolic Execution for a Clash-Free Subset of ASMs ? Gerhard Schellhorna , Gidon Ernsta , J¨org Pf¨ahlera , Stefan Bodenm¨ ullera , a Wolfgang Reif a Institute

Symbolic Execution for a Clash-Free Subset of ASMs ? Gerhard Schellhorna , Gidon Ernsta , J¨org Pf¨ahlera , Stefan Bodenm¨ ullera , a Wolfgang Reif a Institute

DocID: 1xU5v - View Document

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

DocID: 1viNk - View Document