Automatic exploit generation

  • Authors:
  • Thanassis Avgerinos;Sang Kil Cha;Alexandre Rebert;Edward J. Schwartz;Maverick Woo;David Brumley

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA;Carnegie Mellon University, Pittsburgh, PA

  • Venue:
  • Communications of the ACM
  • Year:
  • 2014

Quantified Score

Hi-index 48.22

Visualization

Abstract

The idea is to identify security-critical software bugs so they can be fixed first.