Search dblp for Publications

export results for "Automatic exploit generation"

 download as .bib file

@inproceedings{DBLP:conf/ccs/KangD21,
  author    = {Xiyu Kang and
               Saumya Debray},
  editor    = {Christophe Hauser and
               Yonghwi Kwon and
               Sebastian Banescu},
  title     = {A Framework for Automatic Exploit Generation for {JIT} Compilers},
  booktitle = {Checkmate@CCS 2021, Proceedings of the Research on offensive and defensive
               techniques in the Context of Man At The End {(MATE)} Attacks, Virtual
               Event, Republic of Korea, 19 November 2021},
  pages     = {11--19},
  publisher = {{ACM}},
  year      = {2021},
  url       = {https://doi.org/10.1145/3465413.3488573},
  doi       = {10.1145/3465413.3488573},
  timestamp = {Tue, 23 Nov 2021 15:54:42 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/KangD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncs/BrizendineB21,
  author    = {Bramwell Brizendine and
               Austin Babcock},
  editor    = {Kim{-}Kwang Raymond Choo and
               Tommy H. Morris and
               Gilbert L. Peterson and
               Eric S. Imsand},
  title     = {A Novel Method for the Automatic Generation of {JOP} Chain Exploits},
  booktitle = {National Cyber Summit {(NCS)} Research Track 2021, Huntsville, AL,
               USA, September 28-30, 2021},
  series    = {Lecture Notes in Networks and Systems},
  volume    = {310},
  pages     = {77--92},
  publisher = {Springer},
  year      = {2021},
  url       = {https://doi.org/10.1007/978-3-030-84614-5\_7},
  doi       = {10.1007/978-3-030-84614-5\_7},
  timestamp = {Mon, 13 Jun 2022 18:49:36 +0200},
  biburl    = {https://dblp.org/rec/conf/ncs/BrizendineB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pricai/CruzRLVC21,
  author    = {Jan Christian Blaise Cruz and
               Jose Kristian Resabal and
               James Lin and
               Dan John Velasco and
               Charibeth Cheng},
  editor    = {Duc Nghia Pham and
               Thanaruk Theeramunkong and
               Guido Governatori and
               Fenrong Liu},
  title     = {Exploiting News Article Structure for Automatic Corpus Generation
               of Entailment Datasets},
  booktitle = {{PRICAI} 2021: Trends in Artificial Intelligence - 18th Pacific Rim
               International Conference on Artificial Intelligence, {PRICAI} 2021,
               Hanoi, Vietnam, November 8-12, 2021, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {13032},
  pages     = {86--99},
  publisher = {Springer},
  year      = {2021},
  url       = {https://doi.org/10.1007/978-3-030-89363-7\_7},
  doi       = {10.1007/978-3-030-89363-7\_7},
  timestamp = {Fri, 05 Nov 2021 14:50:31 +0100},
  biburl    = {https://dblp.org/rec/conf/pricai/CruzRLVC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ZhaoWG20,
  author    = {Zixuan Zhao and
               Yan Wang and
               Xiaorui Gong},
  editor    = {Cl{\'{e}}mentine Maurice and
               Leyla Bilge and
               Gianluca Stringhini and
               Nuno Neves},
  title     = {{HAEPG:} An Automatic Multi-hop Exploitation Generation Framework},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
               24-26, 2020, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {12223},
  pages     = {89--109},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-52683-2\_5},
  doi       = {10.1007/978-3-030-52683-2\_5},
  timestamp = {Sun, 25 Jul 2021 11:49:24 +0200},
  biburl    = {https://dblp.org/rec/conf/dimva/ZhaoWG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimL19,
  author    = {Gun{-}Woo Kim and
               Dong{-}Ho Lee},
  title     = {Intelligent Health Diagnosis Technique Exploiting Automatic Ontology
               Generation and Web-Based Personal Health Record Services},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {9419--9444},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2891710},
  doi       = {10.1109/ACCESS.2019.2891710},
  timestamp = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/access/KimL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/FangWW19,
  author    = {Hao Fang and
               Lifa Wu and
               Zhiyong Wu},
  title     = {{\unicode{22522}}{\unicode{20110}}{\unicode{31526}}{\unicode{21495}}{\unicode{25191}}{\unicode{34892}}{\unicode{30340}}Return-to-dl-resolve{\unicode{21033}}{\unicode{29992}}{\unicode{20195}}{\unicode{30721}}{\unicode{33258}}{\unicode{21160}}{\unicode{29983}}{\unicode{25104}}{\unicode{26041}}{\unicode{27861}}
               (Automatic Return-to-dl-resolve Exploit Generation Method Based on
               Symbolic Execution)},
  journal   = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume    = {46},
  number    = {2},
  pages     = {127--132},
  year      = {2019},
  url       = {https://doi.org/10.11896/j.issn.1002-137X.2019.02.020},
  doi       = {10.11896/j.issn.1002-137X.2019.02.020},
  timestamp = {Fri, 21 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jsjkx/FangWW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JanPAB19,
  author    = {Sadeeq Jan and
               Annibale Panichella and
               Andrea Arcuri and
               Lionel C. Briand},
  title     = {Automatic Generation of Tests to Exploit {XML} Injection Vulnerabilities
               in Web Applications},
  journal   = {{IEEE} Trans. Software Eng.},
  volume    = {45},
  number    = {4},
  pages     = {335--362},
  year      = {2019},
  url       = {https://doi.org/10.1109/TSE.2017.2778711},
  doi       = {10.1109/TSE.2017.2778711},
  timestamp = {Fri, 31 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tse/JanPAB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/ZhouZZLCC19,
  author    = {Mingsong Zhou and
               Fanping Zeng and
               Yu Zhang and
               Chengcheng Lv and
               Zhao Chen and
               Guozhu Chen},
  title     = {Automatic Generation of Capability Leaks' Exploits for Android Applications},
  booktitle = {2019 {IEEE} International Conference on Software Testing, Verification
               and Validation Workshops, {ICST} Workshops 2019, Xi'an, China, April
               22-23, 2019},
  pages     = {291--295},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/ICSTW.2019.00068},
  doi       = {10.1109/ICSTW.2019.00068},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icst/ZhouZZLCC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/AlconL18,
  author    = {{\'{O}}scar Alc{\'{o}}n and
               Elena Lloret},
  title     = {SemPCA-Summarizer: Exploiting Semantic Principal Component Analysis
               for Automatic Summary Generation},
  journal   = {Comput. Informatics},
  volume    = {37},
  number    = {5},
  pages     = {1126--1148},
  year      = {2018},
  url       = {https://doi.org/10.4149/cai\_2018\_5\_1126},
  doi       = {10.4149/cai\_2018\_5\_1126},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cai/AlconL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/AshlockBS18,
  author    = {Daniel A. Ashlock and
               Joseph Alexander Brown and
               Lolita Sultanaeva},
  title     = {Exploiting Fertility to Enable Automatic Content Generation to Ameliorate
               User Fatigue in Interactive Evolutionary Computation},
  booktitle = {2018 {IEEE} Congress on Evolutionary Computation, {CEC} 2018, Rio
               de Janeiro, Brazil, July 8-13, 2018},
  pages     = {1--7},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/CEC.2018.8477986},
  doi       = {10.1109/CEC.2018.8477986},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/cec/AshlockBS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/XuJ0L18,
  author    = {Luhang Xu and
               Weixi Jia and
               Wei Dong and
               Yongjun Li},
  title     = {Automatic Exploit Generation for Buffer Overflow Vulnerabilities},
  booktitle = {2018 {IEEE} International Conference on Software Quality, Reliability
               and Security Companion, {QRS} Companion 2018, Lisbon, Portugal, July
               16-20, 2018},
  pages     = {463--468},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/QRS-C.2018.00085},
  doi       = {10.1109/QRS-C.2018.00085},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/conf/qrs/XuJ0L18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/YangLYLWW17,
  author    = {Shansong Yang and
               Weiming Lu and
               Dezhi Yang and
               Xi Li and
               Chao Wu and
               Baogang Wei},
  title     = {KeyphraseDS: Automatic generation of survey by exploiting keyphrase
               information},
  journal   = {Neurocomputing},
  volume    = {224},
  pages     = {58--70},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.neucom.2016.10.052},
  doi       = {10.1016/j.neucom.2016.10.052},
  timestamp = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijon/YangLYLWW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YouZCWLBL17,
  author    = {Wei You and
               Peiyuan Zong and
               Kai Chen and
               XiaoFeng Wang and
               Xiaojing Liao and
               Pan Bian and
               Bin Liang},
  editor    = {Bhavani Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept
               Exploits},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {2139--2154},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956.3134085},
  doi       = {10.1145/3133956.3134085},
  timestamp = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/YouZCWLBL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/ZinnoBBCLFLMMP17,
  author    = {Ivana Zinno and
               Manuela Bonano and
               Sabatino Buonanno and
               Francesco Casu and
               Claudio De Luca and
               Adele Fusco and
               Riccardo Lanari and
               Michele Manunta and
               Mariarosaria Manzo and
               Antonio Pepe},
  title     = {Sentinel-1 data exploitation for automatic surface deformation time-series
               generation through the SBAS-DInSAR parallel processing chain},
  booktitle = {2017 {IEEE} International Geoscience and Remote Sensing Symposium,
               {IGARSS} 2017, Fort Worth, TX, USA, July 23-28, 2017},
  pages     = {5529--5532},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/IGARSS.2017.8128256},
  doi       = {10.1109/IGARSS.2017.8128256},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/igarss/ZinnoBBCLFLMMP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/GarciaHGM17,
  author    = {Joshua Garcia and
               Mahmoud Hammad and
               Negar Ghorbani and
               Sam Malek},
  editor    = {Eric Bodden and
               Wilhelm Sch{\"{a}}fer and
               Arie van Deursen and
               Andrea Zisman},
  title     = {Automatic generation of inter-component communication exploits for
               Android applications},
  booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
               Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages     = {661--671},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3106237.3106286},
  doi       = {10.1145/3106237.3106286},
  timestamp = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl    = {https://dblp.org/rec/conf/sigsoft/GarciaHGM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rocling/HsiehLCWHC16,
  author    = {Yu{-}Lun Hsieh and
               Shih{-}Hung Liu and
               Kuan{-}Yu Chen and
               Hsin{-}Min Wang and
               Wen{-}Lian Hsu and
               Berlin Chen},
  editor    = {Chung{-}Hsien Wu and
               Yuen{-}Hsien Tseng and
               Hung{-}Yu Kao and
               Lun{-}Wei Ku and
               Yu Tsao and
               Shih{-}Hung Wu},
  title     = {{\unicode{36939}}{\unicode{29992}}{\unicode{24207}}{\unicode{21015}}{\unicode{21040}}{\unicode{24207}}{\unicode{21015}}{\unicode{29983}}{\unicode{25104}}{\unicode{26550}}{\unicode{27083}}{\unicode{26044}}{\unicode{37325}}{\unicode{23531}}{\unicode{24335}}{\unicode{33258}}{\unicode{21205}}{\unicode{25688}}{\unicode{35201}}(Exploiting
               Sequence-to-Sequence Generation Framework for Automatic Abstractive
               Summarization)[In Chinese]},
  booktitle = {Proceedings of the 28th Conference on Computational Linguistics and
               Speech Processing, {ROCLING} 2016, National Cheng Kung University,
               Tainan, Taiwan, October 6-7, 2015},
  publisher = {Association for Computational Linguistics and Chinese Language Processing
               (ACLCLP), Taiwan},
  year      = {2016},
  url       = {https://aclanthology.org/O16-1012/},
  timestamp = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/rocling/HsiehLCWHC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuCASL15,
  author    = {Hong Hu and
               Zheng Leong Chua and
               Sendroiu Adrian and
               Prateek Saxena and
               Zhenkai Liang},
  editor    = {Jaeyeon Jung and
               Thorsten Holz},
  title     = {Automatic Generation of Data-Oriented Exploits},
  booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
               D.C., USA, August 12-14, 2015},
  pages     = {177--192},
  publisher = {{USENIX} Association},
  year      = {2015},
  url       = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/hu},
  timestamp = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl    = {https://dblp.org/rec/conf/uss/HuCASL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AvgerinosCRSWB14,
  author    = {Thanassis Avgerinos and
               Sang Kil Cha and
               Alexandre Rebert and
               Edward J. Schwartz and
               Maverick Woo and
               David Brumley},
  title     = {Automatic exploit generation},
  journal   = {Commun. {ACM}},
  volume    = {57},
  number    = {2},
  pages     = {74--84},
  year      = {2014},
  url       = {https://doi.org/10.1145/2560217.2560219},
  doi       = {10.1145/2560217.2560219},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cacm/AvgerinosCRSWB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/HuangHHLL14,
  author    = {Shih{-}Kun Huang and
               Min{-}Hsiang Huang and
               Po{-}Yen Huang and
               Han{-}Lin Lu and
               Chung{-}Wei Lai},
  title     = {Software Crash Analysis for Automatic Exploit Generation on Binary
               Programs},
  journal   = {{IEEE} Trans. Reliab.},
  volume    = {63},
  number    = {1},
  pages     = {270--289},
  year      = {2014},
  url       = {https://doi.org/10.1109/TR.2014.2299198},
  doi       = {10.1109/TR.2014.2299198},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tr/HuangHHLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/AmalfitanoAFGMNVM14,
  author    = {Domenico Amalfitano and
               Nicola Amatucci and
               Anna Rita Fasolino and
               Ugo Gentile and
               Gianluca Mele and
               Roberto Nardone and
               Valeria Vittorini and
               Stefano Marrone},
  editor    = {Radu Dobrin and
               Peter Wallin and
               Ana C. R. Paiva and
               Myra B. Cohen},
  title     = {Improving code coverage in android apps testing by exploiting patterns
               and automatic test case generation},
  booktitle = {WISE'14, Proceedings of the 2014 {ACM} International Workshop on Long-term
               Industrial Collaboration on Software Engineering, Vasteras, Sweden,
               September 16, 2014},
  pages     = {29--34},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2647648.2656426},
  doi       = {10.1145/2647648.2656426},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/kbse/AmalfitanoAFGMNVM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/BaiJS13,
  author    = {Xiao Bai and
               Flavio Paiva Junqueira and
               Srinivasan H. Sengamedu},
  editor    = {Inderjit S. Dhillon and
               Yehuda Koren and
               Rayid Ghani and
               Ted E. Senator and
               Paul Bradley and
               Rajesh Parekh and
               Jingrui He and
               Robert L. Grossman and
               Ramasamy Uthurusamy},
  title     = {Exploiting user clicks for automatic seed set generation for entity
               matching},
  booktitle = {The 19th {ACM} {SIGKDD} International Conference on Knowledge Discovery
               and Data Mining, {KDD} 2013, Chicago, IL, USA, August 11-14, 2013},
  pages     = {980--988},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2487575.2487662},
  doi       = {10.1145/2487575.2487662},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/kdd/BaiJS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangSLYYF13,
  author    = {Minghua Wang and
               Purui Su and
               Qi Li and
               Lingyun Ying and
               Yi Yang and
               Dengguo Feng},
  editor    = {Tanveer A. Zia and
               Albert Y. Zomaya and
               Vijay Varadharajan and
               Zhuoqing Morley Mao},
  title     = {Automatic Polymorphic Exploit Generation for Software Vulnerabilities},
  booktitle = {Security and Privacy in Communication Networks - 9th International
               {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
               25-28, 2013, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {127},
  pages     = {216--233},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-04283-1\_14},
  doi       = {10.1007/978-3-319-04283-1\_14},
  timestamp = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/securecomm/WangSLYYF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangHHLLL12,
  author    = {Shih{-}Kun Huang and
               Min{-}Hsiang Huang and
               Po{-}Yen Huang and
               Chung{-}Wei Lai and
               Han{-}Lin Lu and
               Wai{-}Meng Leong},
  title     = {{CRAX:} Software Crash Analysis for Automatic Exploit Generation by
               Modeling Attacks as Symbolic Continuations},
  booktitle = {Sixth International Conference on Software Security and Reliability,
               {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages     = {78--87},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/SERE.2012.20},
  doi       = {10.1109/SERE.2012.20},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/conf/ssiri/HuangHHLLL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AvgerinosCHB11,
  author    = {Thanassis Avgerinos and
               Sang Kil Cha and
               Brent Lim Tze Hao and
               David Brumley},
  title     = {{AEG:} Automatic Exploit Generation},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  publisher = {The Internet Society},
  year      = {2011},
  url       = {https://www.ndss-symposium.org/ndss2011/aeg-automatic-exploit-generation},
  timestamp = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl    = {https://dblp.org/rec/conf/ndss/AvgerinosCHB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/KrawiecW10,
  author    = {Krzysztof Krawiec and
               Bartosz Wieloch},
  title     = {Automatic generation and exploitation of related problems in genetic
               programming},
  booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
               2010, Barcelona, Spain, 18-23 July 2010},
  pages     = {1--8},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/CEC.2010.5586120},
  doi       = {10.1109/CEC.2010.5586120},
  timestamp = {Thu, 16 Dec 2021 14:02:32 +0100},
  biburl    = {https://dblp.org/rec/conf/cec/KrawiecW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrumleyPSZ08,
  author    = {David Brumley and
               Pongsin Poosankam and
               Dawn Xiaodong Song and
               Jiang Zheng},
  title     = {Automatic Patch-Based Exploit Generation is Possible: Techniques and
               Implications},
  booktitle = {2008 {IEEE} Symposium on Security and Privacy (S{\&}P 2008), 18-21
               May 2008, Oakland, California, {USA}},
  pages     = {143--157},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://doi.org/10.1109/SP.2008.17},
  doi       = {10.1109/SP.2008.17},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/BrumleyPSZ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ras/TeradaK06,
  author    = {Koji Terada and
               Yasuo Kuniyoshi},
  title     = {Automatic motion generation exploiting the global structure of nonlinear
               dynamics based on finite-time reachability},
  journal   = {Robotics Auton. Syst.},
  volume    = {54},
  number    = {8},
  pages     = {696--705},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.robot.2006.02.015},
  doi       = {10.1016/j.robot.2006.02.015},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ras/TeradaK06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/IdeMKS06,
  author    = {Ichiro Ide and
               Hiroshi Mo and
               Norio Katayama and
               Shin'ichi Satoh},
  title     = {Exploiting Topic Thread Structures in a News Video Archive for the
               Semi-Automatic Generation of Video Summaries},
  booktitle = {Proceedings of the 2006 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2006, July 9-12 2006, Toronto, Ontario, Canada},
  pages     = {1473--1476},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {https://doi.org/10.1109/ICME.2006.262820},
  doi       = {10.1109/ICME.2006.262820},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icmcs/IdeMKS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nlp/ClouzotAT00,
  author    = {Catherine Clouzot and
               Georges Antoniadis and
               Agn{\`{e}}s Tutin},
  editor    = {Dimitris Christodoulakis},
  title     = {Constitution and Exploitation of an Annotation System of Electronic
               Corpora: Toward Automatic Generation of Understandable Pronouns in
               French Language},
  booktitle = {Natural Language Processing - {NLP} 2000, Second International Conference,
               Patras, Greece, June 2-4, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1835},
  pages     = {242--251},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45154-4\_23},
  doi       = {10.1007/3-540-45154-4\_23},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/conf/nlp/ClouzotAT00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/CornoPRR96,
  author    = {Fulvio Corno and
               Paolo Prinetto and
               Maurizio Rebaudengo and
               Matteo Sonza Reorda},
  editor    = {Hans{-}Michael Voigt and
               Werner Ebeling and
               Ingo Rechenberg and
               Hans{-}Paul Schwefel},
  title     = {Exploiting Competing Subpopulations for Automatic Generation of Test
               Sequences for Digital Cicuits},
  booktitle = {Parallel Problem Solving from Nature - {PPSN} IV, International Conference
               on Evolutionary Computation. The 4th International Conference on Parallel
               Problem Solving from Nature, Berlin, Germany, September 22-26, 1996,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1141},
  pages     = {792--800},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-61723-X\_1042},
  doi       = {10.1007/3-540-61723-X\_1042},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ppsn/CornoPRR96.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics