Unleashing mayhem on binary code SK Cha, T Avgerinos, A Rebert, D Brumley 2012 IEEE Symposium on Security and Privacy, 380-394, 2012 | 764 | 2012 |
Automatic exploit generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 587 | 2014 |
Enhancing symbolic execution with veritesting T Avgerinos, A Rebert, SK Cha, D Brumley Proceedings of the 36th International Conference on Software Engineering …, 2014 | 341 | 2014 |
Optimizing seed selection for fuzzing A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 861-875, 2014 | 299 | 2014 |
The mayhem cyber reasoning system T Avgerinos, D Brumley, J Davis, R Goulden, T Nighswander, A Rebert, ... IEEE Security & Privacy 16 (2), 52-60, 2018 | 52 | 2018 |
Methods and systems for automatically testing software T Avgerinos, A Rebert, D Brumley US Patent 9,619,375, 2017 | 42 | 2017 |
Detecting exploitable bugs in binary code D Brumley, SK Cha, T Avgerinos, A Rebert US Patent 9,183,396, 2015 | 14 | 2015 |
Detecting exploitable bugs in binary code D Brumley, SK Cha, T Avgerinos, A Rebert US Patent 9,542,559, 2017 | 3 | 2017 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | | 2014 |
Automatic Exploit Generation The idea is to identify security-critical software bugs so they can be fixed first. T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley | | |
We lower MAYHEM to binary code (part 1) SK Cha, T Avgerinos, A Rebert, D Brumley | | |