|
[1] Sen, K. (2007). Concolic testing. In Acm (Ed.), Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering (pp. 571–572). [2] K. SEN, Concolic testing, ACM, 2007, pp. 571-572. [3] R. MAJUMDAR and K. SEN, Hybrid concolic testing, IEEE Computer Society, 2007, pp. 416-426. [4] Chipounov, V., Kuznetsov, V., & Candea, G. (2012). The S2E Platform: Design, Implementation, and Applications. ACM Trans.Comput.Syst., 30(1), 1–49 [5] King, J. C. (1976). Symbolic execution and program testing. Commun. ACM, 19(7), 385–394. [6] C. S. P˘as˘areanu andW. Visser, “A survey of new trends in symbolic execution for software testing and analysis,” International Journal on Software Tools for Technology Transfer(STTT), vol. 11, no. 4, pp. 339–353, 2009. [7] E. J. Schwartz, T. Avgerinos, and D. Brumley, “All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask),” in Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P 2010), Berleley/Oakland, California, USA, May 2010, pp. 317–331. [8] P. Godefoid, N. Klarlund and K. Sen, DART: directed automated random testing, ACM, 2005, pp. 213-223. [9] K. Sen, D. Marinov and G. Agha, CUTE: a concolic unit testing engine for C, ACM, 2005. [10] C. Cadar, D. Dunbar and D. Engler, KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs, USENIX Association, 2008, pp. 209-224. [11] C. Lattner and V. S. Adve, “LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation,” in Proceedings of the 2nd IEEE / ACM International Symposium on Code Generation and Optimization (CGO’04), San Jose, CA, USA, March 2004,pp. 75–88. [12] T. Avgerinos, S. K. Cha, B. L. T. Hao, and D. Brumley, “AEG: Automatic Exploit Generation,” in Proceedings of the Network and Distributed System Security Symposium (NDSS’11), San Diego, California, USA, February 2011. [13] Cha, A. R. S. K., Avgerinos, T., & Brumley, D. (2012). Unleashing mayhem on binary code. In IEEE Symposium on Security and Privacy (Vol. 2, pp. 5–3). [14] S. Heelan and D. Kroening, “Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities,” MSc Computer Science Dissertation, University of Oxford UK, 2009. [15] V. Ganesh and D. L. Dill, “A Decision Procedure for Bit-Vectors and Arrays,” in Proceedings of the 19th International Conference on Computer Aided Verification (CAV’07),Berlin, Germany, July 2007, pp. 519–531. [16] C. Barrett and C. Tinelli, “CVC3,” in Proceedings of the 19th International Conference on Computer Aided Verification (CAV’07), Berlin, Germany, July 2007, pp. 298–302. [17] B. Dutertre and L. de Moura, “The Yices SMT solver,” Computer Science Laboratory,SRI International, Tech. Rep., August 2006. [18] L. M. de Moura and N. Bjørner, “Z3: An Efficient SMT Solver,” in Proceedings of the 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS’08), Budapest, Hungary, March - April 2008, pp. 337–340.
|