Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243849
|View full text |Cite
|
Sign up to set email alerts
|

Hawkeye

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 187 publications
(51 citation statements)
references
References 16 publications
0
51
0
Order By: Relevance
“…We evaluated DGF-CFGConstructor with 8 real-world programs; the relevant information is shown in Table 3. These benchmarks are selected according to the evaluations in the related works [28,29,35,36].…”
Section: Evaluation Setupmentioning
confidence: 99%
See 3 more Smart Citations
“…We evaluated DGF-CFGConstructor with 8 real-world programs; the relevant information is shown in Table 3. These benchmarks are selected according to the evaluations in the related works [28,29,35,36].…”
Section: Evaluation Setupmentioning
confidence: 99%
“…The limitation of this technique is that it is difficult to resolve indirect jump targets by pure static analysis. To handle indirect jumps, Chen et al [29] proposed to apply the inclusion-based pointer analysis against the function pointers. The point-to set is calculated by focusing on four rules: address-of, copy, assign, and dereference.…”
Section: Cfg Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…VUzzer 41 extract the control flow and data flow information of the program based on the dynamic and static analysis to guide the generation of test cases corresponding to the execution deeper path. Hawkeye 42 evaluates seeds based on static information and execution traces to improve the seed selection process to cause program crashes faster. Profuzz 43 automatically analyzes input fields that are critical for vulnerability discovery and intelligently adjusts mutation strategies to increase the probability of discovering vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%