University of Minnesota
Security and Privacy in Computing
index.php

Readings on: bug hunting

Main reading for March 31st:

Manuel Egele, David Brumley, Yanick Fratantonio, and Christopher Kruegel. “An empirical study of cryptographic misuse in Android applications”. In ACM Conference on Computer and Communications Security, pages 73–84, Berlin, Germany, November 2013.
[ACM]

Main reading for April 2nd:

Johannes Dahse and Thorsten Holz. “Simulation of built-in PHP features for precise static code analysis”. In Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, February 2014.
[Internet Society]

Not selected:

Maverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley. “Scheduling black-box mutational fuzzing”. In ACM Conference on Computer and Communications Security, pages 511–522, Berlin, Germany, November 2013.
[ACM]

Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, and Dawson R. Engler. “A few billion lines of code later: using static analysis to find bugs in the real world”. Communications of the ACM, 53(2):66–75, February 2010.
[ACM]