|
[1] A. Gotlieb and M. Petit, "Path-oriented random testing," in RT '06: Proceedings of the 1st International Workshop on Random Testing, 2006, pp. 28-35. [2] P. Godefroid, N. Klarlund and K. Sen, "DART: Directed automated random testing," in PLDI '05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2005, pp. 213-223. [3] K. Sen, D. Marinov and G. Agha, "CUTE: A concolic unit testing engine for C," in ESEC/FSE-13: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, pp. 263-272. [4] C. Cadar and D. Engler, "Execution Generated Test Cases," 2005. [5] C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill and D. R. Engler, "EXE: Automatically generating inputs of death," in CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 322-335. [6] J. Yang, C. Sar, P. Twohey, C. Cadar and D. Engler, "Automatically generating malicious disks using symbolic execution," in SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S\&P'06), 2006, pp. 243-257. [7] J. S. Foster, T. Terauchi and A. Aiken, "Flow-sensitive type qualifiers," in PLDI '02: Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, 2002, pp. 1-12. [8] C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe and R. Stata, "Extended static checking for java," in PLDI '02: Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, 2002, pp. 234-245. [9] E. Haugh and M. Bishop, "Testing C Programs for Buffer Overflow Vulnerabilities," 2003 [10] D. Avots, M. Dalton, V. B. Livshits and M. S. Lam, "Improving software security with a C pointer analysis," in ICSE '05: Proceedings of the 27th International Conference on Software Engineering, 2005, pp. 332-341. [11] E. Clarke, O. Grumberg, S. Jha, Y. Lu and H. Veith, "Counterexample-guided abstraction refinement for symbolic model checking," J. ACM, vol. 50, pp. 752-794, 2003. [12] D. Beyer, A. J. Chlipala and R. Majumdar, "Generating tests from counterexamples," in ICSE '04: Proceedings of the 26th International Conference on Software Engineering, 2004, pp. 326-335. [13] E. Clarke, "SATABS: SAT-based predicate abstraction for ANSI-C," in Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2005); Lecture Notes in Computer Science, 2005, pp. 570-574. [14] E. Clarke, "A tool for checking ANSI-C programs," in Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004); Lecture Notes in Computer Science, 2004, pp. 168-176. [15] G. C. Necula, S. McPeak, S. P. Rahul and W. Weimer, "CIL: Intermediate language and tools for analysis and transformation of C programs," in Computational Complexity, 2002, pp. 213-228. [16] C. Barrett and S. Berezin, "CVC lite: A new implementation of the cooperating validity checker," in Proceedings of the International Conference on Computer Aided Verification (CAV '04); Lecture Notes in Computer Science, 2004, pp. 515-518. [17] “Antiword: a free MS word document reader” http://www.winfield.demon.nl/
|