Index of /ref/



Analysis and Defense of Vulnerabilities in Binary Code.pdf  856K May 16 18:49
A New Model of Program Dependences for Reverse Engineering.pdf  171K May 16 18:49
A Semantics-Based Approach to Malware Detection.pdf  344K May 16 18:49
A Smart Fuzzer for x86 Executables.pdf  274K May 16 18:49
A Survey of Program Slicing Techniques.pdf  378K May 16 18:49
Automated Synthesis of Symbolic Instruction Encodings from IO Samples.pdf  230K May 16 18:49
Automated Whitebox Fuzz Testing.pdf  638K May 16 18:49
Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.pdf  928K May 16 18:49
Automatic Partial Loop Summarization in Dynamic Test Generation.pdf  232K May 16 18:49
Automatic Patch-Based Exploit Generation is Possible - Techniques and Implications.pdf  215K May 16 18:49
Automatic Reverse Engineering of Data Structures from Binary Execution.pdf  367K May 16 18:49
Binary Rewriting without Relocation Information.pdf  190K May 16 18:49
Bootkit Threats - In Depth Reverse Engineering and Defense.pdf  3.9M May 16 18:49
Chopping - A Generalization of Slicing.pdf  109K May 16 18:49
Code-Reuse Attacks - New Frontiers and Defenses [bletsch].pdf  784K May 16 18:49
Creating Vulnerability Signatures Using Weakest Preconditions.pdf  224K May 16 18:49
DART - Directed Automated Random Testing.pdf  159K May 16 18:49
Dealing with next-generation malware.pdf  1.4M May 16 18:49
Debugging Tech Guide Dev.pdf  491K May 16 18:49
Deriving Input Syntactic Structure From Execution.pdf  546K May 16 18:49
Developing Applications With Objective Caml.pdf  2.8M May 16 18:49
Dynamic Taint Analysis and Forward Symbolic Execution.pdf  284K May 16 18:49
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software.pdf  197K May 16 18:49
Dynamic Test Generation for Large Binary Programs.pdf  1.3M May 16 18:49
Dytan - A Generic Dynamic Taint Analysis Framework.pdf  348K May 16 18:49
Enabling Sophisticated Analyses of x86 Binaries with RevGen.pdf  112K May 16 18:49
EXE - A System for Automatically Generating Inputs of Death Using Symbolic Execution.pdf  194K May 16 18:49
Experiences with Model Inference Assisted Fuzzing.pdf  142K May 16 18:49
Flayer - Exposing Application Internals.pdf  81K May 16 18:49
Following the White Rabbit - Software attacks against Intel VT-d technology.pdf  689K May 16 18:49
Generating Test Data with Enhanced Context Free Grammars.pdf  214K May 16 18:49
Grammar-Based Specification and Parsing of Binary File Formats.pdf  236K May 16 18:49
Grammar-based Whitebox Fuzzing.pdf  172K May 16 18:49
IDA PLUG-IN WRITING IN C and C++.pdf  508K May 16 18:49
IDA_Pro_Shortcuts.pdf  71K May 16 18:49
Introduction to OCaml.pdf  2.3M May 16 18:49
IntScope - Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.pdf  198K May 16 18:49
Jump-Oriented Programming - A New Class of Code-Reuse Attack.pdf  334K May 16 18:49
LZfuzz - a fast compression-based fuzzer for poorly documentd protocols.pdf  396K May 16 18:49
Metsploit Unleashed.pdf  4.7M May 16 18:49
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf  467K May 16 18:49
Polyglot - Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis.pdf  185K May 16 18:49
Prospex - Protocol Specification Extraction.pdf  247K May 16 18:49
Python arsenal for RE.pdf  1.1M May 16 18:49
Q - Exploit Hardening Made Easy.pdf  686K May 16 18:49
REIL - A platform-independent intermediate representation of disassembled code for static code analysis.pdf  102K May 16 18:49
Renovo - A Hidden Code Extractor for Packed Executables.pdf  125K May 16 18:49
Retrofitting Security in COTS Software with Binary Rewriting.pdf  138K May 16 18:49
Return-Oriented Programming without Returns.pdf  570K May 16 18:49
RWset - Attacking Path Explosion in Constraint-Based Test Generation.pdf  237K May 16 18:49
Smashing the Gadgets - Hindering Return-Oriented Programming Using In-Place Code Randomization.pdf  850K May 16 18:49
SplitScreen - Enabling Efficient, Distributed Malware Detection.pdf  521K May 16 18:49
String Oriented Programming.pdf  211K May 16 18:49
Symbolic Execution Algorithms for Test Generation.pdf  760K May 16 18:49
Symbolic Execution for Software Testing in Practice - Preliminary Assessment.pdf  166K May 16 18:49
The CLASP Application Security Process.pdf  1.4M May 16 18:49
The Handbook of Practical Logic and Automated Reasoning.pdf  2.9M May 16 18:49
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf  293K May 16 18:49
TIE - Principled Reverse Engineering of Types in Binary Programs.pdf  1.5M May 16 18:49
Undangle - Early Detection of Dangling Pointers in Use-After-Free.pdf  523K May 16 18:49