Follow
Alex Rebert
Alex Rebert
Other namesAlexandre Rebert
Verified email at google.com
Title
Cited by
Cited by
Year
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
7962012
Automatic exploit generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
6202014
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
3592014
Optimizing seed selection for fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 861-875, 2014
3242014
The mayhem cyber reasoning system
T Avgerinos, D Brumley, J Davis, R Goulden, T Nighswander, A Rebert, ...
IEEE Security & Privacy 16 (2), 52-60, 2018
502018
Methods and systems for automatically testing software
T Avgerinos, A Rebert, D Brumley
US Patent 9,619,375, 2017
442017
Detecting exploitable bugs in binary code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,183,396, 2015
162015
Secure by design: Google’s perspective on memory safety
A Rebert, C Kern
Technical report, Google Security Engineering, 2024
72024
Detecting exploitable bugs in binary code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,542,559, 2017
32017
Unleashing the Mayhem CRS
T Avgerinos, D Brumley, J Davis, R Goulden, T Nighswander, A Rebert
22016
It is time to standardize principles and practices for software memory safety
RNM Watson, J Baldwin, D Chisnall, T Chen, J Clarke, B Davis, N Filardo, ...
Communications of the ACM, 2025
2025
It is time to standardize principles and practices for software memory safety (extended version)
RNM Watson, J Baldwin, T Chen, D Chisnall, J Clarke, B Davis, ...
University of Cambridge, Computer Laboratory, 2025
2025
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
2014
Automatic Exploit Generation The idea is to identify security-critical software bugs so they can be fixed first.
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
The system can't perform the operation now. Try again later.
Articles 1–14