A survey of automated techniques for formal software verification

V D'silva, D Kroening… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The quality and the correctness of software are often the greatest concern in electronic
systems. Formal verification tools can provide a guarantee that a design is free of specific …

Symbolic execution for software testing: three decades later

C Cadar, K Sen - Communications of the ACM, 2013 - dl.acm.org
Symbolic execution for software testing Page 1 82 communicaTionS of The acm | february
2013 | vol. 56 | no. 2 review articles ill us tra tion b y marius w a tz sYMBoliC eXeCUtioN has …

Using Crash Hoare logic for certifying the FSCQ file system

H Chen, D Ziegler, T Chajed, A Chlipala… - Proceedings of the 25th …, 2015 - dl.acm.org
FSCQ is the first file system with a machine-checkable proof (using the Coq proof assistant)
that its implementation meets its specification and whose specification includes crashes …

EXE: Automatically generating inputs of death

C Cadar, V Ganesh, PM Pawlowski, DL Dill… - ACM Transactions on …, 2008 - dl.acm.org
This article presents EXE, an effective bug-finding tool that automatically generates inputs
that crash real code. Instead of running code on manually or randomly constructed input …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Symbolic execution for software testing in practice: preliminary assessment

C Cadar, P Godefroid, S Khurshid… - Proceedings of the 33rd …, 2011 - dl.acm.org
We present results for the" Impact Project Focus Area" on the topic of symbolic execution as
used in software testing. Symbolic execution is a program analysis technique introduced in …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Compositional dynamic test generation

P Godefroid - Proceedings of the 34th annual ACM SIGPLAN …, 2007 - dl.acm.org
Dynamic test generation is a form of dynamic program analysis that attempts to compute test
inputs to drive a program along a specific program path. Directed Automated Random …

Prospex: Protocol specification extraction

PM Comparetti, G Wondracek… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Protocol reverse engineering is the process of extracting application-level specifications for
network protocols. Such specifications are very useful in a number of security-related …