netgear-repair.bib
@inproceedings{schulte2013embedded,
author = {Eric Schulte and Jonathan DiLorenzo and Westley Weimer and Stephanie Forrest},
title = {Automated Repair of Binary and Assembly Programs for Cooperating Embedded Devices},
booktitle = {Proceedings of the eighteenth international conference on Architectural Support for Programming Languages and Operating Systems},
year = 2013,
organization = {ACM}
}
@misc{shodan,
author = {Robert O’Harrow Jr},
title = {Cyber search engine Shodan exposes industrial control systems to new risks},
month = {June},
year = 2012,
note = {http://articles.washingtonpost.com/2012-06-03/news/35459595\_1\_computer-systems-desktop-computers-search-engine}
}
@misc{greenberg2012oracle,
author = {Andy Greenberg},
title = {Oracle Quietly Releases Fix For Serious Java Security Bug--Months After It Was Reported},
note = {http://www.forbes.com/sites/andygreenberg/2012/08/30/oracle-quietly-releases-fix-for-serious-java-security-bug-months-after-it-was-reported/},
year = 2012,
month = {August},
day = 30
}
@misc{lemos2003microsoft,
author = {Robert Lemos},
title = {Microsoft details new security plan},
note = {http://news.cnet.com/Microsoft-details-new-security-plan/2100-1002\_3-5088846.html},
month = {October},
year = 2003,
day = 9
}
@misc{zcutlip,
author = {Zachary Cutlip},
title = {Complete, Persistent Compromise of Netgear Wireless Routers},
note = {http://shadow-file.blogspot.com/2013/10/complete-persistent-compromise-of.html},
year = 2013,
month = {October},
day = 22
}
@article{mesirov2010accessible,
author = {Mesirov, Jill P},
title = {Accessible reproducible research},
journal = {Science},
year = {2010},
volume = {327},
number = {5964},
pages = {415--416}
}
@book{buckheit1995wavelab,
author = {Buckheit, Jonathan B and Donoho, David L},
title = {Wavelab and reproducible research},
publisher = {Springer},
year = {1995}
}
@article{schulte2012reproducible-research,
author = {Eric Schulte and Dan Davison and Tom Dye and Carsten Dominik},
title = {A Multi-Language Computing Environment for Literate Programming and Reproducible Research},
journal = {Journal of Statistical Software},
year = {2012},
volume = {46},
number = {3},
month = {January}
}
@article{arora2006does,
author = {Arora, Ashish and Nandkumar, Anand and Telang, Rahul},
title = {Does information security attack frequency increase with vulnerability disclosure? An empirical analysis},
journal = {Information Systems Frontiers},
year = {2006},
volume = {8},
number = {5},
pages = {350--362}
}
@article{frei20080,
author = {Frei, Stefan and Tellenbach, Bernhard and Plattner, Bernhard},
title = {0-day patch exposing vendors (in) security performance},
journal = {BlackHat Europe, Amsterdam, NL},
year = {2008}
}
@article{arora2008optimal,
author = {Arora, Ashish and Telang, Rahul and Xu, Hao},
title = {Optimal policy for software vulnerability disclosure},
journal = {Management Science},
year = {2008},
volume = {54},
number = {4},
pages = {642--656}
}
@inproceedings{cashell2004economic,
author = {Cashell, Brian and Jackson, William D and Jickling, Mark and Webel, Baird},
title = {The economic impact of cyber-attacks},
year = {2004},
organization = {Congressional Research Service, Library of Congress}
}
@inproceedings{weimer06,
author = {Westley Weimer},
title = {Patches as better bug reports},
booktitle = {Generative Programming and Component Engineering},
year = 2006,
pages = {181-190},
ee = {http://doi.acm.org/10.1145/1173706.1173734},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@techreport{symantec2013threat,
author = {Symantec Corporation},
title = {Internet Security Threat Report},
institution = {Symantec Corporation},
year = 2013,
volume = 18
}
@misc{lougher2006squashfs,
author = {Lougher, P and Lougher, R},
title = {SQUASHFS-A squashed read-only filesystem for Linux},
year = {2006}
}
@inproceedings{bellard2005qemu,
author = {Bellard, Fabrice},
title = {QEMU, a Fast and Portable Dynamic Translator.},
booktitle = {USENIX Annual Technical Conference, FREENIX Track},
year = {2005},
pages = {41--46}
}
@article{tis1995tool,
author = {TIS Committee and others},
title = {Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification Version 1.2},
journal = {TIS Committee},
year = {1995}
}
@article{hennessy1982mips,
author = {Hennessy, John and Jouppi, Norman and Przybylski, Steven and Rowen, Christopher and Gross, Thomas and Baskett, Forest and Gill, John},
title = {MIPS: A microprocessor architecture},
journal = {ACM SIGMICRO Newsletter},
year = {1982},
volume = {13},
number = {4},
pages = {17--22}
}
@inproceedings{forrest2009genetic,
author = {Forrest, Stephanie and Nguyen, ThanhVu and Weimer, Westley and Le Goues, Claire},
title = {A genetic programming approach to automated software repair},
booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary computation},
year = {2009},
pages = {947--954},
organization = {ACM}
}
@inproceedings{nguyen2013semfix,
author = {Nguyen, Hoang Duong Thien and Qi, Dawei and Roychoudhury, Abhik and Chandra, Satish},
title = {SemFix: Program repair via semantic analysis},
booktitle = {Proceedings of the 2013 International Conference on Software Engineering},
year = {2013},
pages = {772--781},
organization = {IEEE Press}
}
@inproceedings{clearview,
author = {Perkins, Jeff H and Kim, Sunghun and Larsen, Sam and Amarasinghe, Saman and Bachrach, Jonathan and Carbin, Michael and Pacheco, Carlos and Sherwood, Frank and Sidiroglou, Stelios and Sullivan, Greg and others},
title = {Automatically patching errors in deployed software},
booktitle = {Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles},
year = {2009},
pages = {87--102},
organization = {ACM}
}
@book{Luke2013Metaheuristics,
author = {Sean Luke},
title = {Essentials of Metaheuristics},
publisher = {Lulu},
year = {2013},
edition = {second},
note = {Available for free at http://cs.gmu.edu/$\sim$sean/book/metaheuristics/}
}
@article{schulte2013software,
author = {Schulte, Eric and Fry, ZacharyP. and Fast, Ethan and Weimer, Westley and Forrest, Stephanie},
title = {Software mutational robustness},
journal = {Genetic Programming and Evolvable Machines},
year = {2013},
pages = {1-32}
}
@inproceedings{zeller2010,
title = {Automated fixing of programs with contracts},
ee = {http://doi.acm.org/10.1145/1831708.1831716},
booktitle = {International Symposium on Software Testing and Analysis },
author = {Yi Wei and Yu Pei and Carlo A. Furia and Lucas S. Silva and Stefan Buchholz and Bertrand Meyer and Andreas Zeller},
year = {2010},
bibsource = {DBLP, http://dblp.uni-trier.de},
pages = {61-72}
}
@inproceedings{legoues2011systematicstudy,
author = {Claire Le Goues and Michael Dewey-Vogt and Stephanie Forrest and Westley Weimer},
title = {A Systematic Study of Automated Program Repairs: Fixing 55 out of 105 bugs for \$8 Each},
booktitle = {Software Engineering, 2012. ICSE 2012.},
year = {2011},
organization = {IEEE}
}
@inproceedings{le2012representations,
author = {Le Goues, Claire and Weimer, Westley and Forrest, Stephanie},
title = {Representations and operators for improving evolutionary software repair},
booktitle = {Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference},
year = {2012},
pages = {959--966},
organization = {ACM}
}
@article{genprog-tse-journal,
title = {{GenProg}: A Generic Method for Automated Software Repair},
journal = {Transactions on Software Engineering},
author = {Claire {Le Goues} and ThanhVu Nguyen and Stephanie Forrest and Westley Weimer},
volume = {38},
number = {1},
pages = {54--72},
year = {2012}
}
@inproceedings{delta,
title = {Yesterday, My Program Worked. {Today}, It Does Not. {Why?}},
ee = {http://link.springer.de/link/service/series/0558/bibs/1687/16870253.htm},
booktitle = {Foundations of Software Engineering},
author = {Andreas Zeller},
pages = {253--267},
year = {1999},
bibsource = {DBLP, http://dblp.uni-trier.de},
old_pages = {253-267}
}
@inproceedings{fixes-become-bugs,
author = {Zuoning Yin and
Ding Yuan and
Yuanyuan Zhou and
Shankar Pasupathy and
Lakshmi N. Bairavasundaram},
title = {How do fixes become bugs?},
booktitle = {Foundations of Software Engineering},
year = {2011},
pages = {26--36},
old_ee = {http://doi.acm.org/10.1145/2025113.2025121},
old_bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{schulte2013optimization,
author = {Eric Schulte and Jonathan Dorn and Stephen Harding and Stephanie Forrest and Westley Weimer},
title = {Post-compiler Software Optimization for Reducing Energy},
booktitle = {Proceedings of the nineteenth international conference on Architectural Support for Programming Languages and Operating Systems},
year = 2014,
organization = {ACM}
}
@inproceedings{par,
author = {Kim, Dongsun and Nam, Jaechang and Song, Jaewoo and Kim, Sunghun},
title = {Automatic Patch Generation Learned from Human-Written Patches},
booktitle = {Proceedings of the 2013 International Conference on Software Engineering},
year = {2013},
pages = {802--811},
organization = {IEEE Press}
}
@book{poli2008field,
author = {Poli, R. and Langdon, W.B. and McPhee, N.F.},
title = {A field guide to genetic programming},
publisher = {Lulu Enterprises Uk Ltd},
year = 2008
}
@article{koza2000automatic,
author = {Koza, John R and Keane, Martin A and Yu, Jessen and Bennett III, Forrest H and Mydlowec, William},
title = {Automatic creation of human-competitive programs and controllers by means of genetic programming},
journal = {Genetic Programming and Evolvable Machines},
year = {2000},
volume = {1},
number = {1-2},
pages = {121--164}
}
@article{koza1992genetic,
author = {John R. Koza},
title = {Genetic Programming: On the Programming of Computers by Means of Natural Selection, 1992},
journal = {See http://miriad. Iip6. fr/microbes Modeling Adaptive Multi-Agent Systems Inspired by Developmental Biology},
year = {1992},
volume = {229}
}
@book{holland1992adaptation,
author = {John Henry Holland},
title = {Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence},
publisher = {The MIT press},
year = {1992}
}
@inproceedings{weimer2009automatically,
author = {Westley Weimer and ThanhVu Nguyen and Claire {Le Goues} and Stephanie Forrest},
title = {Automatically finding patches using genetic programming},
booktitle = {Proceedings of the 31st International Conference on Software Engineering},
year = {2009},
pages = {364--374},
organization = {IEEE Computer Society}
}
@article{kuhling2002brute,
author = {K{\"u}hling, F. and Wolff, K. and Nordin, P.},
title = {A Brute-Force Approac to Automatic Induction of Machine Code on CISC Architectures},
journal = {Genetic Programming},
year = {2002},
pages = {288--297}
}
@article{sitthi2011genetic,
author = {Pitchaya Sitthi-Amorn and Nicholas Modly and Westly Weimer and Jason Lawrence},
title = {Genetic programming for shader simplification},
journal = {ACM Transactions on Graphics (TOG)},
year = {2011},
volume = {30},
number = {6},
pages = {152}
}
@article{miller1990empirical,
title = {An empirical study of the reliability of UNIX utilities},
author = {Miller, Barton P and Fredriksen, Louis and So, Bryan},
journal = {Communications of the ACM},
volume = {33},
number = {12},
pages = {32--44},
year = {1990},
publisher = {ACM}
}
@article{costa2008vigilante,
author = {Costa, Manuel and Crowcroft, Jon and Castro, Miguel and Rowstron, Antony and Zhou, Lidong and Zhang, Lintao and Barham, Paul},
title = {Vigilante: End-to-end containment of internet worm epidemics},
journal = {ACM Transactions on Computer Systems (TOCS)},
year = {2008},
volume = {26},
number = {4},
pages = {9}
}
@inproceedings{brumley2008automatic,
title = {Automatic patch-based exploit generation is possible: Techniques and implications},
author = {Brumley, David and Poosankam, Pongsin and Song, Dawn and Zheng, Jiang},
booktitle = {Security and Privacy, 2008. SP 2008. IEEE Symposium on},
pages = {143--157},
year = {2008},
organization = {IEEE}
}
@misc{biggest-router-bug,
author = {Earl Zmijewski},
title = {Reckless Driving on the Internet},
month = {February},
year = 2009,
note = {http://www.renesys.com/2009/02/the-flap-heard-around-the-world/}
}
@misc{d-link,
author = {Dennis Fisher},
title = {D-Link Planning to Patch Router Backdoor Bug},
month = {October},
year = 2013,
note = {http://threatpost.com/d-link-planning-to-patch-router-backdoor-bug/102581}
}
@inproceedings{handigol2012debugger,
title = {Where is the debugger for my software-defined network?},
author = {Handigol, Nikhil and Heller, Brandon and Jeyakumar, Vimalkumar and Mazi{\`e}res, David and McKeown, Nick},
booktitle = {Proceedings of the first workshop on Hot topics in software defined networks},
pages = {55--60},
year = {2012},
organization = {ACM}
}
@misc{ieee-sp-09,
key = {ieee-sp-09},
howpublished = {Vol. 7, No. 1},
month = {Jan./Feb.},
year = 2009,
title = {{IEEE} Security and Privacy, Special Issue on {IT} monocultures}
}