2006 IEEE Symposium on Security and Privacy (S&P'06) 2006
DOI: 10.1109/sp.2006.7
|View full text |Cite
|
Sign up to set email alerts
|

Automatically generating malicious disks using symbolic execution

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…[23,24]. Cristian Cadar et al devised a dynamic bug-finding method [5,25,26]. That method is based on the observation that code can generate its own test cases at run-time by a combination of symbolic and concrete execution.…”
Section: Related Workmentioning
confidence: 99%
“…[23,24]. Cristian Cadar et al devised a dynamic bug-finding method [5,25,26]. That method is based on the observation that code can generate its own test cases at run-time by a combination of symbolic and concrete execution.…”
Section: Related Workmentioning
confidence: 99%
“…Symbolic execution [37] is a technique for finding software bugs in various systems [6,42,60,67,68]. However, symbolic execution suffers from the path explosion problem.…”
Section: Introductionmentioning
confidence: 99%