All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)

作者: Edward J. Schwartz , Thanassis Avgerinos , David Brumley

DOI: 10.1109/SP.2010.26

关键词:

摘要: … Thus, forward symbolic execution needs a strategy for choosing which state to explore next. This choice is important, because loops with symbolic conditions may never terminate. If an …

参考文章(64)
Cristian Cadar, David L. Dill, Dawson R. Engler, Vijay Ganesh, Peter M. Pawlowski, EXE: A system for automatically generating inputs of death using symbolic execution computer and communications security. ,(2006)
Zhenkai Liang, Juan Caballero, Dawn Song, David Brumley, James Newsome, Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation usenix security symposium. pp. 15- ,(2007)
R. Sekar, An Efficient Black-box Technique for Defeating Web Application Attacks. network and distributed system security symposium. ,(2009)
David A. Molnar, Michael Y. Levin, Patrice Godefroid, Automated Whitebox Fuzz Testing. network and distributed system security symposium. ,(2008)
Engin Kirda, Christopher Krügel, Nenad Jovanovic, Giovanni Vigna, Philipp Vogt, Florian Nentwich, Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. network and distributed system security symposium. ,(2007)
Maia Ginsburg, Andrew W. Appel, Modern Compiler Implementation in C ,(2007)
Peter Boonstoppel, Cristian Cadar, Dawson Engler, RWset: attacking path explosion in constraint-based test generation tools and algorithms for construction and analysis of systems. pp. 351- 366 ,(2008) , 10.1007/978-3-540-78800-3_27
Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans, Automatically Hardening Web Applications Using Precise Tainting information security conference. pp. 295- 307 ,(2004) , 10.1007/0-387-25660-1_20
David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin, Automatically Identifying Trigger-based Behavior in Malware Botnet Detection. pp. 65- 88 ,(2008) , 10.1007/978-0-387-68768-1_4
Clark Barrett, Sergey Berezin, CVC Lite: A New Implementation of the Cooperating Validity Checker Computer Aided Verification. pp. 515- 518 ,(2004) , 10.1007/978-3-540-27813-9_49