Information Technology Reference
In-Depth Information
18. de Moura, L., Bjørner, N.S.: Z3: An efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J.
(eds.) TACAS 2008. LNCS, vol. 4963, pp. 337-340. Springer, Heidelberg (2008)
19. Heelan, S., Gianni, A.: Augmenting vulnerability analysis of binary code. In: Annual Com-
puter Security Applications Conference, pp. 199-208 (2012)
20. Sekar, R.: An efficient black-box technique for defeating web application attacks. In: NDSS
(2009)
21. Li, L., Just, J.E., Sekar, R.: Online signature generation for windows systems. In: Annual
Computer Security Applications Conference, pp. 289-298 (2009)
22. Ganai, M.K., Lee, D., Gupta, A.: DTAM: dynamic taint analysis of multi-threaded programs
for relevancy. In: FSE (2012)
23. Wang, C., Kundu, S., Limaye, R., Ganai, M., Gupta, A.: Symbolic predictive analysis for
concurrent programs. Int. J. Formal Aspects of Computing, 1-25 (April 2011)
24. Wang, C., Ganai, M.: Predicting concurrency failures in generalized traces of x86 exe-
cutables. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 4-18. Springer,
Heidelberg (2012)
 
Search WWH ::




Custom Search