netgear-repair.bib

@inproceedings{schulte2013embedded,
  author = {Eric Schulte and Jonathan DiLorenzo and Westley Weimer and Stephanie Forrest},
  title = {Automated Repair of Binary and Assembly Programs for Cooperating Embedded Devices},
  booktitle = {Proceedings of the eighteenth international conference on Architectural Support for Programming Languages and Operating Systems},
  year = 2013,
  organization = {ACM}
}
@misc{shodan,
  author = {Robert O’Harrow Jr},
  title = {Cyber search engine Shodan exposes industrial control systems to new risks},
  month = {June},
  year = 2012,
  note = {http://articles.washingtonpost.com/2012-06-03/news/35459595\_1\_computer-systems-desktop-computers-search-engine}
}
@misc{greenberg2012oracle,
  author = {Andy Greenberg},
  title = {Oracle Quietly Releases Fix For Serious Java Security Bug--Months After It Was Reported},
  note = {http://www.forbes.com/sites/andygreenberg/2012/08/30/oracle-quietly-releases-fix-for-serious-java-security-bug-months-after-it-was-reported/},
  year = 2012,
  month = {August},
  day = 30
}
@misc{lemos2003microsoft,
  author = {Robert Lemos},
  title = {Microsoft details new security plan},
  note = {http://news.cnet.com/Microsoft-details-new-security-plan/2100-1002\_3-5088846.html},
  month = {October},
  year = 2003,
  day = 9
}
@misc{zcutlip,
  author = {Zachary Cutlip},
  title = {Complete, Persistent Compromise of Netgear Wireless Routers},
  note = {http://shadow-file.blogspot.com/2013/10/complete-persistent-compromise-of.html},
  year = 2013,
  month = {October},
  day = 22
}
@article{mesirov2010accessible,
  author = {Mesirov, Jill P},
  title = {Accessible reproducible research},
  journal = {Science},
  year = {2010},
  volume = {327},
  number = {5964},
  pages = {415--416}
}
@book{buckheit1995wavelab,
  author = {Buckheit, Jonathan B and Donoho, David L},
  title = {Wavelab and reproducible research},
  publisher = {Springer},
  year = {1995}
}
@article{schulte2012reproducible-research,
  author = {Eric Schulte and Dan Davison and Tom Dye and Carsten Dominik},
  title = {A Multi-Language Computing Environment for Literate Programming and Reproducible Research},
  journal = {Journal of Statistical Software},
  year = {2012},
  volume = {46},
  number = {3},
  month = {January}
}
@article{arora2006does,
  author = {Arora, Ashish and Nandkumar, Anand and Telang, Rahul},
  title = {Does information security attack frequency increase with vulnerability disclosure? An empirical analysis},
  journal = {Information Systems Frontiers},
  year = {2006},
  volume = {8},
  number = {5},
  pages = {350--362}
}
@article{frei20080,
  author = {Frei, Stefan and Tellenbach, Bernhard and Plattner, Bernhard},
  title = {0-day patch exposing vendors (in) security performance},
  journal = {BlackHat Europe, Amsterdam, NL},
  year = {2008}
}
@article{arora2008optimal,
  author = {Arora, Ashish and Telang, Rahul and Xu, Hao},
  title = {Optimal policy for software vulnerability disclosure},
  journal = {Management Science},
  year = {2008},
  volume = {54},
  number = {4},
  pages = {642--656}
}
@inproceedings{cashell2004economic,
  author = {Cashell, Brian and Jackson, William D and Jickling, Mark and Webel, Baird},
  title = {The economic impact of cyber-attacks},
  year = {2004},
  organization = {Congressional Research Service, Library of Congress}
}
@inproceedings{weimer06,
  author = {Westley Weimer},
  title = {Patches as better bug reports},
  booktitle = {Generative Programming and Component Engineering},
  year = 2006,
  pages = {181-190},
  ee = {http://doi.acm.org/10.1145/1173706.1173734},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@techreport{symantec2013threat,
  author = {Symantec Corporation},
  title = {Internet Security Threat Report},
  institution = {Symantec Corporation},
  year = 2013,
  volume = 18
}
@misc{lougher2006squashfs,
  author = {Lougher, P and Lougher, R},
  title = {SQUASHFS-A squashed read-only filesystem for Linux},
  year = {2006}
}
@inproceedings{bellard2005qemu,
  author = {Bellard, Fabrice},
  title = {QEMU, a Fast and Portable Dynamic Translator.},
  booktitle = {USENIX Annual Technical Conference, FREENIX Track},
  year = {2005},
  pages = {41--46}
}
@article{tis1995tool,
  author = {TIS Committee and others},
  title = {Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification Version 1.2},
  journal = {TIS Committee},
  year = {1995}
}
@article{hennessy1982mips,
  author = {Hennessy, John and Jouppi, Norman and Przybylski, Steven and Rowen, Christopher and Gross, Thomas and Baskett, Forest and Gill, John},
  title = {MIPS: A microprocessor architecture},
  journal = {ACM SIGMICRO Newsletter},
  year = {1982},
  volume = {13},
  number = {4},
  pages = {17--22}
}
@inproceedings{forrest2009genetic,
  author = {Forrest, Stephanie and Nguyen, ThanhVu and Weimer, Westley and Le Goues, Claire},
  title = {A genetic programming approach to automated software repair},
  booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary computation},
  year = {2009},
  pages = {947--954},
  organization = {ACM}
}
@inproceedings{nguyen2013semfix,
  author = {Nguyen, Hoang Duong Thien and Qi, Dawei and Roychoudhury, Abhik and Chandra, Satish},
  title = {SemFix: Program repair via semantic analysis},
  booktitle = {Proceedings of the 2013 International Conference on Software Engineering},
  year = {2013},
  pages = {772--781},
  organization = {IEEE Press}
}
@inproceedings{clearview,
  author = {Perkins, Jeff H and Kim, Sunghun and Larsen, Sam and Amarasinghe, Saman and Bachrach, Jonathan and Carbin, Michael and Pacheco, Carlos and Sherwood, Frank and Sidiroglou, Stelios and Sullivan, Greg and others},
  title = {Automatically patching errors in deployed software},
  booktitle = {Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles},
  year = {2009},
  pages = {87--102},
  organization = {ACM}
}
@book{Luke2013Metaheuristics,
  author = {Sean Luke},
  title = {Essentials of Metaheuristics},
  publisher = {Lulu},
  year = {2013},
  edition = {second},
  note = {Available for free at http://cs.gmu.edu/$\sim$sean/book/metaheuristics/}
}
@article{schulte2013software,
  author = {Schulte, Eric and Fry, ZacharyP. and Fast, Ethan and Weimer, Westley and Forrest, Stephanie},
  title = {Software mutational robustness},
  journal = {Genetic Programming and Evolvable Machines},
  year = {2013},
  pages = {1-32}
}
@inproceedings{zeller2010,
  title = {Automated fixing of programs with contracts},
  ee = {http://doi.acm.org/10.1145/1831708.1831716},
  booktitle = {International Symposium on Software Testing and Analysis },
  author = {Yi Wei and Yu Pei and Carlo A. Furia and Lucas S. Silva and Stefan Buchholz and Bertrand Meyer and Andreas Zeller},
  year = {2010},
  bibsource = {DBLP, http://dblp.uni-trier.de},
  pages = {61-72}
}
@inproceedings{legoues2011systematicstudy,
  author = {Claire Le Goues and Michael Dewey-Vogt and Stephanie Forrest and Westley Weimer},
  title = {A Systematic Study of Automated Program Repairs: Fixing 55 out of 105 bugs for \$8 Each},
  booktitle = {Software Engineering, 2012. ICSE 2012.},
  year = {2011},
  organization = {IEEE}
}
@inproceedings{le2012representations,
  author = {Le Goues, Claire and Weimer, Westley and Forrest, Stephanie},
  title = {Representations and operators for improving evolutionary software repair},
  booktitle = {Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference},
  year = {2012},
  pages = {959--966},
  organization = {ACM}
}
@article{genprog-tse-journal,
  title = {{GenProg}: A Generic Method for Automated Software Repair},
  journal = {Transactions on Software Engineering},
  author = {Claire {Le Goues} and ThanhVu Nguyen and Stephanie Forrest and Westley Weimer},
  volume = {38},
  number = {1},
  pages = {54--72},
  year = {2012}
}
@inproceedings{delta,
  title = {Yesterday, My Program Worked. {Today}, It Does Not. {Why?}},
  ee = {http://link.springer.de/link/service/series/0558/bibs/1687/16870253.htm},
  booktitle = {Foundations of Software Engineering},
  author = {Andreas Zeller},
  pages = {253--267},
  year = {1999},
  bibsource = {DBLP, http://dblp.uni-trier.de},
  old_pages = {253-267}
}
@inproceedings{fixes-become-bugs,
  author = {Zuoning Yin and
               Ding Yuan and
               Yuanyuan Zhou and
               Shankar Pasupathy and
               Lakshmi N. Bairavasundaram},
  title = {How do fixes become bugs?},
  booktitle = {Foundations of Software Engineering},
  year = {2011},
  pages = {26--36},
  old_ee = {http://doi.acm.org/10.1145/2025113.2025121},
  old_bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{schulte2013optimization,
  author = {Eric Schulte and Jonathan Dorn and Stephen Harding and Stephanie Forrest and Westley Weimer},
  title = {Post-compiler Software Optimization for Reducing Energy},
  booktitle = {Proceedings of the nineteenth international conference on Architectural Support for Programming Languages and Operating Systems},
  year = 2014,
  organization = {ACM}
}
@inproceedings{par,
  author = {Kim, Dongsun and Nam, Jaechang and Song, Jaewoo and Kim, Sunghun},
  title = {Automatic Patch Generation Learned from Human-Written Patches},
  booktitle = {Proceedings of the 2013 International Conference on Software Engineering},
  year = {2013},
  pages = {802--811},
  organization = {IEEE Press}
}
@book{poli2008field,
  author = {Poli, R. and Langdon, W.B. and McPhee, N.F.},
  title = {A field guide to genetic programming},
  publisher = {Lulu Enterprises Uk Ltd},
  year = 2008
}
@article{koza2000automatic,
  author = {Koza, John R and Keane, Martin A and Yu, Jessen and Bennett III, Forrest H and Mydlowec, William},
  title = {Automatic creation of human-competitive programs and controllers by means of genetic programming},
  journal = {Genetic Programming and Evolvable Machines},
  year = {2000},
  volume = {1},
  number = {1-2},
  pages = {121--164}
}
@article{koza1992genetic,
  author = {John R. Koza},
  title = {Genetic Programming: On the Programming of Computers by Means of Natural Selection, 1992},
  journal = {See http://miriad. Iip6. fr/microbes Modeling Adaptive Multi-Agent Systems Inspired by Developmental Biology},
  year = {1992},
  volume = {229}
}
@book{holland1992adaptation,
  author = {John Henry Holland},
  title = {Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence},
  publisher = {The MIT press},
  year = {1992}
}
@inproceedings{weimer2009automatically,
  author = {Westley Weimer and ThanhVu Nguyen and Claire {Le Goues} and Stephanie Forrest},
  title = {Automatically finding patches using genetic programming},
  booktitle = {Proceedings of the 31st International Conference on Software Engineering},
  year = {2009},
  pages = {364--374},
  organization = {IEEE Computer Society}
}
@article{kuhling2002brute,
  author = {K{\"u}hling, F. and Wolff, K. and Nordin, P.},
  title = {A Brute-Force Approac to Automatic Induction of Machine Code on CISC Architectures},
  journal = {Genetic Programming},
  year = {2002},
  pages = {288--297}
}
@article{sitthi2011genetic,
  author = {Pitchaya Sitthi-Amorn and Nicholas Modly and Westly Weimer and Jason Lawrence},
  title = {Genetic programming for shader simplification},
  journal = {ACM Transactions on Graphics (TOG)},
  year = {2011},
  volume = {30},
  number = {6},
  pages = {152}
}
@article{miller1990empirical,
  title = {An empirical study of the reliability of UNIX utilities},
  author = {Miller, Barton P and Fredriksen, Louis and So, Bryan},
  journal = {Communications of the ACM},
  volume = {33},
  number = {12},
  pages = {32--44},
  year = {1990},
  publisher = {ACM}
}
@article{costa2008vigilante,
  author = {Costa, Manuel and Crowcroft, Jon and Castro, Miguel and Rowstron, Antony and Zhou, Lidong and Zhang, Lintao and Barham, Paul},
  title = {Vigilante: End-to-end containment of internet worm epidemics},
  journal = {ACM Transactions on Computer Systems (TOCS)},
  year = {2008},
  volume = {26},
  number = {4},
  pages = {9}
}
@inproceedings{brumley2008automatic,
  title = {Automatic patch-based exploit generation is possible: Techniques and implications},
  author = {Brumley, David and Poosankam, Pongsin and Song, Dawn and Zheng, Jiang},
  booktitle = {Security and Privacy, 2008. SP 2008. IEEE Symposium on},
  pages = {143--157},
  year = {2008},
  organization = {IEEE}
}
@misc{biggest-router-bug,
  author = {Earl Zmijewski},
  title = {Reckless Driving on the Internet},
  month = {February},
  year = 2009,
  note = {http://www.renesys.com/2009/02/the-flap-heard-around-the-world/}
}
@misc{d-link,
  author = {Dennis Fisher},
  title = {D-Link Planning to Patch Router Backdoor Bug},
  month = {October},
  year = 2013,
  note = {http://threatpost.com/d-link-planning-to-patch-router-backdoor-bug/102581}
}
@inproceedings{handigol2012debugger,
  title = {Where is the debugger for my software-defined network?},
  author = {Handigol, Nikhil and Heller, Brandon and Jeyakumar, Vimalkumar and Mazi{\`e}res, David and McKeown, Nick},
  booktitle = {Proceedings of the first workshop on Hot topics in software defined networks},
  pages = {55--60},
  year = {2012},
  organization = {ACM}
}
@misc{ieee-sp-09,
  key = {ieee-sp-09},
  howpublished = {Vol. 7, No. 1},
  month = {Jan./Feb.},
  year = 2009,
  title = {{IEEE} Security and Privacy, Special Issue on {IT} monocultures}
}