Results 91 to 100 of about 1,018,291 (234)

Program state optimal method based on variable symbolic relation analysis

open access: yesTongxin xuebao, 2018
Program analysis is the prime method to program property analysis,which is widely used in the domain of parameter dependent relation,path coverage and test case generation,and a lot of progress has been made.Current program analysis is based on the ...
Xi GUO, Pan WANG
doaj   +2 more sources

Optimizing symbolic execution for malware behavior classification

open access: yesComputers & security, 2020
Increasingly software correctness, reliability, and security is being analyzed using tools that combine various formal and heuristic approaches. Often such analysis becomes expensive in terms of time and at the cost of high quality results.
Stefano Sebastio   +7 more
semanticscholar   +1 more source

Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution [PDF]

open access: yes, 2015
Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data.
A Sabelfeld   +10 more
core   +2 more sources

FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

open access: yes, 2017
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit
Butler, Kevin R. B.   +4 more
core   +1 more source

CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation

open access: yesIEEE Symposium on Security and Privacy, 2019
Cache-based side channels are becoming an important attack vector through which secret information can be leaked to malicious parties. Previous work on cache-based side channel detection, however, suffers from the code coverage problem or does not ...
Robert Brotzman   +4 more
semanticscholar   +1 more source

Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution [PDF]

open access: yes, 2014
Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of the existing interpret ...
Jackson, Daniel, Near, Joseph P.
core  

Soft Contract Verification

open access: yes, 2014
Behavioral software contracts are a widely used mechanism for governing the flow of values between components. However, run-time monitoring and enforcement of contracts imposes significant overhead and delays discovery of faulty components to run-time.
Nguyen, Phuc C.   +2 more
core   +1 more source

An approach of reachability determination for static analysis defects with help of dynamic symbolic execution

open access: yesТруды Института системного программирования РАН, 2018
Historically program analysis methods are divided into two groups - static program analysis methods and dynamic program analysis methods. In this paper, we present a combined approach which allows to determine reachability for defects found by static ...
A. Y. Gerasimov   +3 more
doaj   +1 more source

ToyArchitecture: Unsupervised Learning of Interpretable Models of the World

open access: yes, 2020
Research in Artificial Intelligence (AI) has focused mostly on two extremes: either on small improvements in narrow AI domains, or on universal theoretical frameworks which are usually uncomputable, incompatible with theories of biological intelligence ...
Andersson, Simon   +12 more
core   +1 more source

A Survey of Search Strategies in the Dynamic Symbolic Execution

open access: yesITM Web of Conferences, 2017
Dynamic symbolic execution (DSE) is an important way to discover software vulnerabilities. One key challenge in DSE is to find proper paths in the huge program execution space to generate effective inputs.
Liu Yu, Zhou Xu, Gong Wei-Wei
doaj   +1 more source

Home - About - Disclaimer - Privacy