Author of the publication

Preventing Memory Error Exploits with WIT.

, , , , and . IEEE Symposium on Security and Privacy, page 263-277. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CsmithEdge: more effective compiler testing by handling undefined behaviour less conservatively., , and . Empir. Softw. Eng., 27 (6): 129 (2022)SnapFuzz: An Efficient Fuzzing Framework for Network Applications., and . CoRR, (2022)A Deterministic Memory Allocator for Dynamic Symbolic Execution., , , , and . ECOOP, volume 222 of LIPIcs, page 9:1-9:26. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)High coverage testing of Haskell programs., , and . ISSTA, page 375-385. ACM, (2011)Chopped symbolic execution., , , and . ICSE, page 350-360. ACM, (2018)A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)., , , , and . ACSAC, page 82-90. IEEE Computer Society, (2004)Constraints in Dynamic Symbolic Execution: Bitvectors or Integers?, , and . TAP@FM, volume 11823 of Lecture Notes in Computer Science, page 41-54. Springer, (2019)Symbolic crosschecking of floating-point and SIMD code., , and . EuroSys, page 315-328. ACM, (2011)KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs., , and . OSDI, page 209-224. USENIX Association, (2008)A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors), , , and . #ACSAC04#, (2004)