Xiaochuan Zhang (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology), Wenjie Sun (State Key Laboratory of Mathematical Engineering and Advanced Computing), Jianmin Pang (State Key Laboratory of Mathematical Engineering and Advanced Computing), Fudong Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing), Zhen Ma (State Key Laboratory of Mathematical Engineering and Advanced Computing)
Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture
View More Papers
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic...
Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Read MorePISE: Protocol Inference using Symbolic Execution and Automata Learning
Ron Marcovich, Orna Grumberg, Gabi Nakibly (Technion, Israel Institute of Technology)
Read MoreCreating Human Readable Path Constraints from Symbolic Execution
Tod Amon (Sandia National Laboratories), Tim Loffredo (Sandia National Laboratories)
Read MoreRapid Vulnerability Mitigation with Security Workarounds
Zhen Huang (Pennsylvania State University), Gang Tan (Pennsylvania State University)
Read More