Automatic generation of control flow hijacking exploits for software vulnerabilities S Heelan University of Oxford, 2009 | 68 | 2009 |
Vulnerability detection systems: Think cyborg, not robot S Heelan IEEE Security and Privacy 9 (3), 74-77, 2011 | 41 | 2011 |
SMT Solvers in Software Security. J Vanegue, S Heelan, R Rolles WOOT 12, 9-22, 2012 | 40 | 2012 |
Automatic Heap Layout Manipulation for Exploitation S Heelan, T Melham, D Kroening 27th USENIX Security Symposium (USENIX Security 18), 763-779, 2018 | 23 | 2018 |
Augmenting vulnerability analysis of binary code S Heelan, A Gianni Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 12 | 2012 |
Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters S Heelan, T Melham, D Kroening CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security …, 2019 | 6 | 2019 |
Evaluating manual intervention to address the challenges of bug finding with KLEE J Galea, S Heelan, D Neville, D Kroening arXiv preprint arXiv:1805.03450, 2018 | 3 | 2018 |
Learning Concise Models from Long Execution Traces S Heelan, T Melham, D Kroening, T Melham, S Heelan, T Melham, ... 57th {ACM/IEEE} Design Automation Conference,{DAC} 2020, San Francisco 8254 …, 2016 | | 2016 |
Greybox Automatic Exploit Generation for Heap Overflows in Language Interpreters S Heelan | | |