博客

SHEPHERD: Just when I thought I was out... they pull me back in

Don't get me wrong, I was a quite willing participant with all of this. 

作者: 最后更新时间: 2018/07/10 - 08:08
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
作者: Engblom, Jakob (Intel) 最后更新时间: 2019/08/02 - 15:51