BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis R David, S Bardin, TD Ta, L Mounier, J Feist, ML Potet, JY Marion 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 101 | 2016 |
Backward-bounded DSE: targeting infeasibility questions on obfuscated codes S Bardin, R David, JY Marion 2017 IEEE Symposium on Security and Privacy (SP), 633-651, 2017 | 75 | 2017 |
Sound and quasi-complete detection of infeasible test requirements S Bardin, M Delahaye, R David, N Kosmatov, M Papadakis, Y Le Traon, ... 2015 IEEE 8th International Conference on Software Testing, Verification and …, 2015 | 55 | 2015 |
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free J Feist, L Mounier, S Bardin, R David, ML Potet Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016 | 43 | 2016 |
Specification of concretization and symbolization policies in symbolic execution R David, S Bardin, J Feist, L Mounier, ML Potet, TD Ta, JY Marion Proceedings of the 25th International Symposium on Software Testing and …, 2016 | 38 | 2016 |
Qsynth-a program synthesis based approach for binary code deobfuscation R David, L Coniglio, M Ceccato BAR 2020 Workshop, 2020 | 33 | 2020 |
Arrays Made Simpler: An Efficient, Scalable and Thorough Preprocessing. B Farinier, R David, S Bardin, M Lemerre LPAR, 363-380, 2018 | 25 | 2018 |
Testing for bounded faults in RAMs R David, JA Brzozowski, H Jürgensen University of Waterloo, Computer Science Department, 1992 | 6 | 1992 |
WILSON: A Comparison of Commercial and Military Computer Security Policies DD Clark, R DAVID Proceedings of the IEEE Symposium on Security and Privacy, 184-194, 1987 | 6 | 1987 |
Building a commit-level dataset of real-world vulnerabilities A Challande, R David, G Renault Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 5 | 2022 |
Formal approaches for automatic deobfuscation and reverse-engineering of protected codes R David Université de Lorraine, 2017 | 5 | 2017 |
From source code to crash test-cases through software testing automation R David, J Salwan, J Bourroux Proceedings of the 28th C&ESAR, 27, 2021 | 3 | 2021 |
Exploitation du graphe de dépendance d'AOSP à des fins de sécurité A Challande, R David, G Renault SSTIC 2021-Symposium sur la sécurité des technologies de l'information et …, 2021 | 2 | 2021 |
Simplification efficace pour la théorie des tableaux B Farinier, R David, S Bardin Journées Francophones des Langages Applicatifs 2018, 195, 2018 | 2 | 2018 |
Targeting Infeasibility Questions on Obfuscated Codes R David, S Bardin, JY Marion arXiv preprint arXiv:1612.05675, 2016 | 2 | 2016 |
System, method and computer program product for detecting infeasible events in dynamic programs S Bardin, R David US Patent 10,360,134, 2019 | 1 | 2019 |
PASTIS: A Collaborative Approach to Combine Heterogeneous Software Testing Techniques R David, R Abou Chaaya, C Heitman 2023 IEEE/ACM International Workshop on Search-Based and Fuzz Testing (SBFT …, 2023 | | 2023 |
Quokka: A Fast and Accurate Binary Exporter A Challande, R David, G Renault GreHack 2022-10th International Symposium on Research in Grey-Hat Hacking, 2022 | | 2022 |
Towards Patch Detection using Binary Only Semantic Signatures A Challande, G Renault, R David | | 2022 |
Patch Detection using Binary Only Semantic Signatures A Challande, R David, G Renault | | 2021 |