Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

[PDF][PDF] Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.

C Cadar, D Dunbar, DR Engler - OSDI, 2008 - usenix.org
We present a new symbolic execution tool, KLEE, capable of automatically generating tests
that achieve high coverage on a diverse set of complex and environmentally-intensive …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

BitBlaze: A new approach to computer security via binary analysis

D Song, D Brumley, H Yin, J Caballero, I Jager… - … Systems Security: 4th …, 2008 - Springer
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …

Method, system and computer program product for detecting at least one of security threats and undesirable computer files

KR Borders - US Patent 9,055,093, 2015 - Google Patents
US9055093B2 - Method, system and computer program product for detecting at least one of
security threats and undesirable computer files - Google Patents US9055093B2 - Method …

Polyglot: Automatic extraction of protocol message format using dynamic binary analysis

J Caballero, H Yin, Z Liang, D Song - … of the 14th ACM conference on …, 2007 - dl.acm.org
Protocol reverse engineering, the process of extracting the application-level protocol used
by an implementation, without access to the protocol specification, is important for many …

Prospex: Protocol specification extraction

PM Comparetti, G Wondracek… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Protocol reverse engineering is the process of extracting application-level specifications for
network protocols. Such specifications are very useful in a number of security-related …

Automatic patch-based exploit generation is possible: Techniques and implications

D Brumley, P Poosankam, D Song… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
The automatic patch-based exploit generation problem is: given a program P and a patched
version of the program P', automatically generate an exploit for the potentially unknown …

Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations

C Brubaker, S Jana, B Ray, S Khurshid… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded …

[PDF][PDF] Automatic protocol format reverse engineering through context-aware monitored execution.

Z Lin, X Jiang, D Xu, X Zhang - NDSS, 2008 - ndss-symposium.org
Protocol reverse engineering has often been a manual process that is considered time-
consuming, tedious and error-prone. To address this limitation, a number of solutions have …