Stephen McCamant
Titel
Geciteerd door
Geciteerd door
Jaar
The Daikon system for dynamic detection of likely invariants
MD Ernst, JH Perkins, PJ Guo, S McCamant, C Pacheco, MS Tschantz, ...
Science of Computer Programming 69 (1-3), 35-45, 2007
12252007
Practical control flow integrity and randomization for binary executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 559-573, 2013
5352013
A symbolic execution framework for javascript
P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song
Security and Privacy (SP), 2010 IEEE Symposium on, 513-528, 2010
5162010
Dta++: dynamic taint analysis with targeted control-flow propagation.
MG Kang, S McCamant, P Poosankam, D Song
NDSS, 2011
3282011
Evaluating SFI for a CISC Architecture.
S McCamant, G Morrisett
USENIX Security Symposium, 2006
2722006
Quantitative information flow as network flow capacity
S McCamant, MD Ernst
ACM SIGPLAN Notices 43 (6), 193-205, 2008
2192008
Loop-extended symbolic execution on binary programs
P Saxena, P Poosankam, S McCamant, D Song
Proceedings of the eighteenth international symposium on Software testing …, 2009
2102009
Binary code extraction and interface identification for security applications
J Caballero, NM Johnson, S McCamant, D Song
CALIFORNIA UNIV BERKELEY DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2009
1632009
Statically-directed dynamic automated test generation
D Babić, L Martignoni, S McCamant, D Song
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
1542011
Inference and enforcement of data structure consistency specifications
B Demsky, MD Ernst, PJ Guo, S McCamant, JH Perkins, M Rinard
Proceedings of the 2006 international symposium on Software testing and …, 2006
1542006
Emulating emulation-resistant malware
MG Kang, H Yin, S Hanna, S McCamant, D Song
Proceedings of the 1st ACM workshop on Virtual machine security, 11-22, 2009
1442009
Predicting problems caused by component upgrades
S McCamant, MD Ernst
ACM SIGSOFT Software Engineering Notes 28 (5), 287-296, 2003
992003
Differential slicing: Identifying causal execution differences for security applications
NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ...
Security and Privacy (SP), 2011 IEEE Symposium on, 347-362, 2011
962011
Differential slicing: Identifying causal execution differences for security applications
NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ...
Security and Privacy (SP), 2011 IEEE Symposium on, 347-362, 2011
962011
Measuring channel capacity to distinguish undue influence
J Newsome, S McCamant, D Song
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
962009
Dynamic inference of abstract types
PJ Guo, JH Perkins, S McCamant, MD Ernst
Proceedings of the 2006 international symposium on Software testing and …, 2006
942006
Path-exploration lifting: Hi-fi tests for lo-fi emulators
L Martignoni, S McCamant, P Poosankam, D Song, P Maniatis
ACM SIGARCH Computer Architecture News 40 (1), 337-348, 2012
922012
Input generation via decomposition and re-stitching: Finding bugs in malware
J Caballero, P Poosankam, S McCamant, D Song
Proceedings of the 17th ACM conference on Computer and communications …, 2010
742010
Early identification of incompatibilities in multi-component upgrades
S McCamant, MD Ernst
European Conference on Object-Oriented Programming, 440-464, 2004
602004
Hi-cfg: Construction by binary analysis and application to attack polymorphism
D Caselden, A Bazhanyuk, M Payer, S McCamant, D Song
European Symposium on Research in Computer Security, 164-181, 2013
522013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20