A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. Grieco, G., Mounier, L., Potet, M., & Rawat, S. In ICSTW, September, 2013. Paper bibtex @inproceedings{grieco_stack_2013,
title = {A {Stack} {Model} for {Symbolic} {Buffer} {Overflow} {Exploitability} {Analysis}},
url = {http://binsec.gforge.inria.fr/pdf/cstva-verimag.pdf},
booktitle = {{ICSTW}},
author = {Grieco, Gustavo and Mounier, Laurent and Potet, Marie-Laure and Rawat, Sanjay},
month = sep,
year = {2013},
keywords = {binary analysis, constraint-satisfaction, exploitability, symbolic execution, type\_backup, type\_workshop},
}
Downloads: 0
{"_id":"C93naWg4XC7caYmHH","bibbaseid":"grieco-mounier-potet-rawat-astackmodelforsymbolicbufferoverflowexploitabilityanalysis-2013","author_short":["Grieco, G.","Mounier, L.","Potet, M.","Rawat, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"A Stack Model for Symbolic Buffer Overflow Exploitability Analysis","url":"http://binsec.gforge.inria.fr/pdf/cstva-verimag.pdf","booktitle":"ICSTW","author":[{"propositions":[],"lastnames":["Grieco"],"firstnames":["Gustavo"],"suffixes":[]},{"propositions":[],"lastnames":["Mounier"],"firstnames":["Laurent"],"suffixes":[]},{"propositions":[],"lastnames":["Potet"],"firstnames":["Marie-Laure"],"suffixes":[]},{"propositions":[],"lastnames":["Rawat"],"firstnames":["Sanjay"],"suffixes":[]}],"month":"September","year":"2013","keywords":"binary analysis, constraint-satisfaction, exploitability, symbolic execution, type_backup, type_workshop","bibtex":"@inproceedings{grieco_stack_2013,\n\ttitle = {A {Stack} {Model} for {Symbolic} {Buffer} {Overflow} {Exploitability} {Analysis}},\n\turl = {http://binsec.gforge.inria.fr/pdf/cstva-verimag.pdf},\n\tbooktitle = {{ICSTW}},\n\tauthor = {Grieco, Gustavo and Mounier, Laurent and Potet, Marie-Laure and Rawat, Sanjay},\n\tmonth = sep,\n\tyear = {2013},\n\tkeywords = {binary analysis, constraint-satisfaction, exploitability, symbolic execution, type\\_backup, type\\_workshop},\n}\n\n","author_short":["Grieco, G.","Mounier, L.","Potet, M.","Rawat, S."],"key":"grieco_stack_2013","id":"grieco_stack_2013","bibbaseid":"grieco-mounier-potet-rawat-astackmodelforsymbolicbufferoverflowexploitabilityanalysis-2013","role":"author","urls":{"Paper":"http://binsec.gforge.inria.fr/pdf/cstva-verimag.pdf"},"keyword":["binary analysis","constraint-satisfaction","exploitability","symbolic execution","type_backup","type_workshop"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://download.vusec.net/papers/zotero.php?tag=&full=1&format=bibtex&sort=date","dataSources":["dJukw6aGvZy4sGYRn","aqCbEpw6z8C87rCxe","LY5xkJFgS2sBQ9umB","cEmMXPermWEFsgmMR"],"keywords":["binary analysis","constraint-satisfaction","exploitability","symbolic execution","type_backup","type_workshop"],"search_terms":["stack","model","symbolic","buffer","overflow","exploitability","analysis","grieco","mounier","potet","rawat"],"title":"A Stack Model for Symbolic Buffer Overflow Exploitability Analysis","year":2013}