Affiliation:
1. Carnegie Mellon University, Pittsburgh, PA
Abstract
The idea is to identify security-critical software bugs so they can be fixed first.
Funder
National Science Foundation
Defense Advanced Research Projects Agency
Lockheed Martin
Prabhu and Poonam Goel Fellowship
Northrop Grumman
Publisher
Association for Computing Machinery (ACM)
Cited by
127 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automating the correctness assessment of AI-generated code for security contexts;Journal of Systems and Software;2024-10
2. Silent Taint-Style Vulnerability Fixes Identification;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
3. Natural Symbolic Execution-Based Testing for Big Data Analytics;Proceedings of the ACM on Software Engineering;2024-07-12
4. Concretely Mapped Symbolic Memory Locations for Memory Error Detection;IEEE Transactions on Software Engineering;2024-07
5. PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation;2024 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR);2024-05-16