Automatic exploit generation, Communications of the ACM, vol.57, issue.2, p.2014 ,
DOI : 10.1145/2560217.2560219
Enhancing symbolic execution with VeriTesting, pp.2014-2014 ,
DOI : 10.1145/2568225.2568293
Binary-Level Testing of Embedded Programs, 2013 13th International Conference on Quality Software, p.2013, 2013. ,
DOI : 10.1109/QSIC.2013.49
Structural Testing of Executables, 2008 International Conference on Software Testing, Verification, and Validation, 2008. ,
DOI : 10.1109/ICST.2008.8
Osmose: Automatic structural testing of executables. Software Testing, Verification Reliability, p.2011 ,
The BINCOA Framework for Binary Code Analysis, 2011. ,
DOI : 10.1007/978-3-642-14295-6_27
URL : https://hal.archives-ouvertes.fr/hal-01006499
Refinement-Based CFG Reconstruction from Unstructured Programs, p.2011, 2011. ,
DOI : 10.1007/978-3-642-14295-6_27
Engineering theories with Z3, 2012. ,
Billions and billions of constraints: Whitebox fuzz testing in production, 2013 35th International Conference on Software Engineering (ICSE), 2013. ,
DOI : 10.1109/ICSE.2013.6606558
Automatically dissecting malicious binaries, 2007. ,
Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays, 2009. ,
DOI : 10.1007/978-3-540-78800-3_24
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI 2008. USENIX Association, 2008. ,
Exe: Automatically generating inputs of death, 2006. ,
Symbolic execution for software testing in practice, Proceeding of the 33rd international conference on Software engineering, ICSE '11, 2011. ,
DOI : 10.1145/1985793.1985995
Symbolic execution for software testing, Communications of the ACM, vol.56, issue.2, p.2013 ,
DOI : 10.1145/2408776.2408795
Unleashing Mayhem on Binary Code, 2012 IEEE Symposium on Security and Privacy, pp.2012-2012 ,
DOI : 10.1109/SP.2012.31
URL : http://doi.org/10.1109/sp.2012.31
S2E: A platform for in-vivo multi-path analysis of software systems, 2011. ,
The S2E Platform, ACM Transactions on Computer Systems, vol.30, issue.1 ,
DOI : 10.1145/2110356.2110358
BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis. In: SANER 2016 BINSEC: Binary code analysis with low-level regions, TACAS 2015, pp.2016-2015 ,
URL : https://hal.archives-ouvertes.fr/hal-01721502
Dart: Directed automated random testing, SIGPLAN Not, vol.40, issue.6, 2005. ,
SAGE, Communications of the ACM, vol.55, issue.3, p.2012 ,
DOI : 10.1145/2093548.2093564
Augmenting vulnerability analysis of binary code, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, p.2012 ,
DOI : 10.1145/2420950.2420981
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, 1976. ,
DOI : 10.1145/360248.360252
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask), 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.26
Cute: A concolic unit testing engine for C. SIGSOFT Softw, Eng. Notes, issue.5, p.30, 2005. ,
BitBlaze: A New Approach to Computer Security via Binary Analysis, 2008. ,
DOI : 10.1145/1315245.1315261
On-the-fly generation of K-path tests for C functions, Proceedings. 19th International Conference on Automated Software Engineering, 2004., 2004. ,
DOI : 10.1109/ASE.2004.1342749