ABCD, ACM SIGPLAN Notices, vol.35, issue.5, pp.321-333, 2000. ,
DOI : 10.1145/358438.349342
Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI, pp.209-224, 2008. ,
CVE-2016-1287: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability, 2016. ,
The new linux 'perf' tools, Slides from Linux Kongress, 2010. ,
CSSV, ACM SIGPLAN Notices, vol.38, issue.5, pp.155-167, 2003. ,
DOI : 10.1145/780822.781149
Improving security using extensible lightweight static analysis, IEEE Software, vol.19, issue.1, pp.42-51, 2002. ,
DOI : 10.1109/52.976940
URL : http://www.cs.virginia.edu/evans/pubs/ieeesoftware.pdf
Stat- Sym: Vulnerable Path Discovery through Statistics-guided Symbolic Execution CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow, Proceedings of 2017 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2017. 10. Google, 2015. ,
Fuzzing: the state of the art, 2012. ,
SoftBound: Highly Compatible and Complete Spatial Memory Safety for C, Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.245-258, 2009. ,
CCured, ACM SIGPLAN Notices, vol.37, issue.1, pp.128-139, 2002. ,
DOI : 10.1145/565816.503286
Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions, IEEE Transactions on Reliability, vol.65, issue.4, p.2016 ,
DOI : 10.1109/TR.2016.2570538
Detecting Hardware Covert Timing Channels, IEEE Micro, vol.36, issue.5, pp.17-27, 2016. ,
DOI : 10.1109/MM.2016.83
Scheduling black-box mutational fuzzing, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.511-522, 2013. ,
DOI : 10.1145/2508859.2516736
Array bounds check elimination for the Java HotSpot client compiler, 5th International Symposium on Principles and practice of programming in Java, pp.125-133, 2007. ,
Joern: A Robust Code Analysis Platform for C/C++, 2016. ,
Generalized vulnerability extrapolation using abstract syntax trees, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.359-368, 2012. ,
DOI : 10.1145/2420950.2421003
URL : http://user.informatik.uni-goettingen.de/%7Ekrieck/docs/2012-acsac.pdf
Chucky, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.499-510, 2013. ,
DOI : 10.1145/2508859.2516665
JOP-alarm: Detecting jump-oriented programming-based anomalies in applications, 2013 IEEE 31st International Conference on Computer Design (ICCD), pp.467-470, 2013. ,
DOI : 10.1109/ICCD.2013.6657084