Index of /ref/
Analysis and Defense of Vulnerabilities in Binary Code.pdf
856K
May
16
18:49
A New Model of Program Dependences for Reverse Engineering.pdf
171K
May
16
18:49
A Semantics-Based Approach to Malware Detection.pdf
344K
May
16
18:49
A Smart Fuzzer for x86 Executables.pdf
274K
May
16
18:49
A Survey of Program Slicing Techniques.pdf
378K
May
16
18:49
Automated Synthesis of Symbolic Instruction Encodings from IO Samples.pdf
230K
May
16
18:49
Automated Whitebox Fuzz Testing.pdf
638K
May
16
18:49
Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.pdf
928K
May
16
18:49
Automatic Partial Loop Summarization in Dynamic Test Generation.pdf
232K
May
16
18:49
Automatic Patch-Based Exploit Generation is Possible - Techniques and Implications.pdf
215K
May
16
18:49
Automatic Reverse Engineering of Data Structures from Binary Execution.pdf
367K
May
16
18:49
Binary Rewriting without Relocation Information.pdf
190K
May
16
18:49
Bootkit Threats - In Depth Reverse Engineering and Defense.pdf
3.9M
May
16
18:49
Chopping - A Generalization of Slicing.pdf
109K
May
16
18:49
Code-Reuse Attacks - New Frontiers and Defenses [bletsch].pdf
784K
May
16
18:49
Creating Vulnerability Signatures Using Weakest Preconditions.pdf
224K
May
16
18:49
DART - Directed Automated Random Testing.pdf
159K
May
16
18:49
Dealing with next-generation malware.pdf
1.4M
May
16
18:49
Debugging Tech Guide Dev.pdf
491K
May
16
18:49
Deriving Input Syntactic Structure From Execution.pdf
546K
May
16
18:49
Developing Applications With Objective Caml.pdf
2.8M
May
16
18:49
Dynamic Taint Analysis and Forward Symbolic Execution.pdf
284K
May
16
18:49
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software.pdf
197K
May
16
18:49
Dynamic Test Generation for Large Binary Programs.pdf
1.3M
May
16
18:49
Dytan - A Generic Dynamic Taint Analysis Framework.pdf
348K
May
16
18:49
Enabling Sophisticated Analyses of x86 Binaries with RevGen.pdf
112K
May
16
18:49
EXE - A System for Automatically Generating Inputs of Death Using Symbolic Execution.pdf
194K
May
16
18:49
Experiences with Model Inference Assisted Fuzzing.pdf
142K
May
16
18:49
Flayer - Exposing Application Internals.pdf
81K
May
16
18:49
Following the White Rabbit - Software attacks against Intel VT-d technology.pdf
689K
May
16
18:49
Generating Test Data with Enhanced Context Free Grammars.pdf
214K
May
16
18:49
Grammar-Based Specification and Parsing of Binary File Formats.pdf
236K
May
16
18:49
Grammar-based Whitebox Fuzzing.pdf
172K
May
16
18:49
IDA PLUG-IN WRITING IN C and C++.pdf
508K
May
16
18:49
IDA_Pro_Shortcuts.pdf
71K
May
16
18:49
Introduction to OCaml.pdf
2.3M
May
16
18:49
IntScope - Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.pdf
198K
May
16
18:49
Jump-Oriented Programming - A New Class of Code-Reuse Attack.pdf
334K
May
16
18:49
LZfuzz - a fast compression-based fuzzer for poorly documentd protocols.pdf
396K
May
16
18:49
Metsploit Unleashed.pdf
4.7M
May
16
18:49
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
467K
May
16
18:49
Polyglot - Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis.pdf
185K
May
16
18:49
Prospex - Protocol Specification Extraction.pdf
247K
May
16
18:49
Python arsenal for RE.pdf
1.1M
May
16
18:49
Q - Exploit Hardening Made Easy.pdf
686K
May
16
18:49
REIL - A platform-independent intermediate representation of disassembled code for static code analysis.pdf
102K
May
16
18:49
Renovo - A Hidden Code Extractor for Packed Executables.pdf
125K
May
16
18:49
Retrofitting Security in COTS Software with Binary Rewriting.pdf
138K
May
16
18:49
Return-Oriented Programming without Returns.pdf
570K
May
16
18:49
RWset - Attacking Path Explosion in Constraint-Based Test Generation.pdf
237K
May
16
18:49
Smashing the Gadgets - Hindering Return-Oriented Programming Using In-Place Code Randomization.pdf
850K
May
16
18:49
SplitScreen - Enabling Efficient, Distributed Malware Detection.pdf
521K
May
16
18:49
String Oriented Programming.pdf
211K
May
16
18:49
Symbolic Execution Algorithms for Test Generation.pdf
760K
May
16
18:49
Symbolic Execution for Software Testing in Practice - Preliminary Assessment.pdf
166K
May
16
18:49
The CLASP Application Security Process.pdf
1.4M
May
16
18:49
The Handbook of Practical Logic and Automated Reasoning.pdf
2.9M
May
16
18:49
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf
293K
May
16
18:49
TIE - Principled Reverse Engineering of Types in Binary Programs.pdf
1.5M
May
16
18:49
Undangle - Early Detection of Dangling Pointers in Use-After-Free.pdf
523K
May
16
18:49