Automatic exploit generation
- 1 February 2014
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 57 (2), 74-84
- https://doi.org/10.1145/2560217.2560219
Abstract
The idea is to identify security-critical software bugs so they can be fixed first.Keywords
Funding Information
- National Science Foundation
- Defense Advanced Research Projects Agency
- Lockheed Martin
- Prabhu and Poonam Goel Fellowship
- Northrop Grumman
This publication has 24 references indexed in Scilit:
- Symbolic execution for software testingCommunications of the ACM, 2013
- Before we knew itPublished by Association for Computing Machinery (ACM) ,2012
- Efficient state merging in symbolic executionPublished by Association for Computing Machinery (ACM) ,2012
- SAGECommunications of the ACM, 2012
- The S2E PlatformACM Transactions on Computer Systems, 2012
- Memory Errors: The Past, the Present, and the FutureLecture Notes in Computer Science, 2012
- Satisfiability modulo theoriesCommunications of the ACM, 2011
- Software model checkingACM Computing Surveys, 2009
- Symbolic execution and program testingCommunications of the ACM, 1976
- SELECT---a formal system for testing and debugging programs by symbolic executionPublished by Association for Computing Machinery (ACM) ,1975