Cyber scanning: a comprehensive survey
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
[PDF][PDF] Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.
We present a new symbolic execution tool, KLEE, capable of automatically generating tests
that achieve high coverage on a diverse set of complex and environmentally-intensive …
that achieve high coverage on a diverse set of complex and environmentally-intensive …
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …
techniques in security analyses. Example applications of dynamic taint analysis and forward …
BitBlaze: A new approach to computer security via binary analysis
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
Method, system and computer program product for detecting at least one of security threats and undesirable computer files
KR Borders - US Patent 9,055,093, 2015 - Google Patents
US9055093B2 - Method, system and computer program product for detecting at least one of
security threats and undesirable computer files - Google Patents US9055093B2 - Method …
security threats and undesirable computer files - Google Patents US9055093B2 - Method …
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used
by an implementation, without access to the protocol specification, is important for many …
by an implementation, without access to the protocol specification, is important for many …
Prospex: Protocol specification extraction
PM Comparetti, G Wondracek… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Protocol reverse engineering is the process of extracting application-level specifications for
network protocols. Such specifications are very useful in a number of security-related …
network protocols. Such specifications are very useful in a number of security-related …
Automatic patch-based exploit generation is possible: Techniques and implications
The automatic patch-based exploit generation problem is: given a program P and a patched
version of the program P', automatically generate an exploit for the potentially unknown …
version of the program P', automatically generate an exploit for the potentially unknown …
Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded …
Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded …
[PDF][PDF] Automatic protocol format reverse engineering through context-aware monitored execution.
Protocol reverse engineering has often been a manual process that is considered time-
consuming, tedious and error-prone. To address this limitation, a number of solutions have …
consuming, tedious and error-prone. To address this limitation, a number of solutions have …