Follow
Stephen McCamant
Title
Cited by
Cited by
Year
The Daikon system for dynamic detection of likely invariants
MD Ernst, JH Perkins, PJ Guo, S McCamant, C Pacheco, MS Tschantz, ...
Science of Computer Programming 69 (1-3), 35-45, 2007
13522007
Practical control flow integrity and randomization for binary executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ...
2013 IEEE Symposium on Security and Privacy, 559-573, 2013
6252013
A symbolic execution framework for javascript
P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song
2010 IEEE Symposium on Security and Privacy, 513-528, 2010
5642010
Dta++: dynamic taint analysis with targeted control-flow propagation.
MG Kang, S McCamant, P Poosankam, D Song
NDSS, 2011
3762011
Evaluating SFI for a CISC Architecture.
S McCamant, G Morrisett
USENIX Security Symposium 10, 1267336.1267351, 2006
2912006
Quantitative information flow as network flow capacity
S McCamant, MD Ernst
Proceedings of the 29th ACM SIGPLAN Conference on Programming Language …, 2008
2302008
Loop-extended symbolic execution on binary programs
P Saxena, P Poosankam, S McCamant, D Song
Proceedings of the eighteenth international symposium on Software testing …, 2009
2282009
Binary code extraction and interface identification for security applications
J Caballero, NM Johnson, S McCamant, D Song
California Univ Berkeley Dept of Electrical Engineering and Computer Science, 2009
1822009
Statically-directed dynamic automated test generation
D Babić, L Martignoni, S McCamant, D Song
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
1782011
Emulating emulation-resistant malware
MG Kang, H Yin, S Hanna, S McCamant, D Song
Proceedings of the 1st ACM workshop on Virtual machine security, 11-22, 2009
1652009
Inference and enforcement of data structure consistency specifications
B Demsky, MD Ernst, PJ Guo, S McCamant, JH Perkins, M Rinard
Proceedings of the 2006 international symposium on Software testing and …, 2006
1602006
Differential slicing: Identifying causal execution differences for security applications
NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ...
2011 IEEE Symposium on Security and Privacy, 347-362, 2011
1052011
Differential slicing: Identifying causal execution differences for security applications
NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ...
2011 IEEE Symposium on Security and Privacy, 347-362, 2011
1052011
Predicting problems caused by component upgrades
S McCamant, MD Ernst
Proceedings of the 9th European software engineering conference held jointly …, 2003
1042003
Path-exploration lifting: Hi-fi tests for lo-fi emulators
L Martignoni, S McCamant, P Poosankam, D Song, P Maniatis
ACM SIGARCH Computer Architecture News 40 (1), 337-348, 2012
1032012
Measuring channel capacity to distinguish undue influence
J Newsome, S McCamant, D Song
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
1022009
Dynamic inference of abstract types
PJ Guo, JH Perkins, S McCamant, MD Ernst
Proceedings of the 2006 international symposium on Software testing and …, 2006
992006
Input generation via decomposition and re-stitching: Finding bugs in malware
J Caballero, P Poosankam, S McCamant, D Babi ć, D Song
Proceedings of the 17th ACM conference on Computer and communications …, 2010
912010
Early identification of incompatibilities in multi-component upgrades
S McCamant, MD Ernst
European Conference on Object-Oriented Programming, 440-464, 2004
652004
Hi-cfg: Construction by binary analysis and application to attack polymorphism
D Caselden, A Bazhanyuk, M Payer, S McCamant, D Song
European Symposium on Research in Computer Security, 164-181, 2013
602013
The system can't perform the operation now. Try again later.
Articles 1–20