Follow
Alexandre Rebert
Alexandre Rebert
Verified email at google.com
Title
Cited by
Cited by
Year
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
7602012
Automatic exploit generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
5852014
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
3392014
Optimizing seed selection for fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 861-875, 2014
2992014
The mayhem cyber reasoning system
T Avgerinos, D Brumley, J Davis, R Goulden, T Nighswander, A Rebert, ...
IEEE Security & Privacy 16 (2), 52-60, 2018
512018
Methods and systems for automatically testing software
T Avgerinos, A Rebert, D Brumley
US Patent 9,619,375, 2017
422017
Detecting exploitable bugs in binary code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,183,396, 2015
142015
Detecting exploitable bugs in binary code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,542,559, 2017
32017
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
2014
Automatic Exploit Generation The idea is to identify security-critical software bugs so they can be fixed first.
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
We lower MAYHEM to binary code (part 1)
SK Cha, T Avgerinos, A Rebert, D Brumley
The system can't perform the operation now. Try again later.
Articles 1–11