KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007. ,
DOI : 10.1145/1326304.1326313
URL : https://hal.archives-ouvertes.fr/inria-00166947
Using game theory to configure P2P SIP, Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '09, pp.1-9, 2009. ,
DOI : 10.1145/1595637.1595645
Lev Nachmanson, and Margus Veanes. Play to test, FATES, pp.32-46, 2005. ,
EXE: Automatically Generating Inputs of Death Using Symbolic Execution, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006. ,
Understanding data lifetime via whole system simulation, SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pp.22-22, 2004. ,
Game models for open systems, Verification: Theory and Practice, pp.269-289, 2003. ,
Grammar-based Whitebox Fuzzing, PLDI'2008: ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008. ,
Matrix games and nash equilibrium, 2007. ,
Vulnerability-specific execution filtering for exploit prevention on commodity software, NDSS, 2006. ,
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005. [12] pedram.amini. PaiMei -reverse engineering framework ,
Gray Hat Python: Python Programming for Hackers and Reverse Engineers, 2009. ,
Autodafé: an Act of Software Torture, Proceedings of the 22th Chaos Communication Congress, pp.47-58, 2005. ,