Results 91 to 100 of about 1,018,291 (234)
Program state optimal method based on variable symbolic relation analysis
Program analysis is the prime method to program property analysis,which is widely used in the domain of parameter dependent relation,path coverage and test case generation,and a lot of progress has been made.Current program analysis is based on the ...
Xi GUO, Pan WANG
doaj +2 more sources
Optimizing symbolic execution for malware behavior classification
Increasingly software correctness, reliability, and security is being analyzed using tools that combine various formal and heuristic approaches. Often such analysis becomes expensive in terms of time and at the cost of high quality results.
Stefano Sebastio +7 more
semanticscholar +1 more source
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution [PDF]
Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data.
A Sabelfeld +10 more
core +2 more sources
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit
Butler, Kevin R. B. +4 more
core +1 more source
CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation
Cache-based side channels are becoming an important attack vector through which secret information can be leaked to malicious parties. Previous work on cache-based side channel detection, however, suffers from the code coverage problem or does not ...
Robert Brotzman +4 more
semanticscholar +1 more source
Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution [PDF]
Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of the existing interpret ...
Jackson, Daniel, Near, Joseph P.
core
Behavioral software contracts are a widely used mechanism for governing the flow of values between components. However, run-time monitoring and enforcement of contracts imposes significant overhead and delays discovery of faulty components to run-time.
Nguyen, Phuc C. +2 more
core +1 more source
Historically program analysis methods are divided into two groups - static program analysis methods and dynamic program analysis methods. In this paper, we present a combined approach which allows to determine reachability for defects found by static ...
A. Y. Gerasimov +3 more
doaj +1 more source
ToyArchitecture: Unsupervised Learning of Interpretable Models of the World
Research in Artificial Intelligence (AI) has focused mostly on two extremes: either on small improvements in narrow AI domains, or on universal theoretical frameworks which are usually uncomputable, incompatible with theories of biological intelligence ...
Andersson, Simon +12 more
core +1 more source
A Survey of Search Strategies in the Dynamic Symbolic Execution
Dynamic symbolic execution (DSE) is an important way to discover software vulnerabilities. One key challenge in DSE is to find proper paths in the huge program execution space to generate effective inputs.
Liu Yu, Zhou Xu, Gong Wei-Wei
doaj +1 more source

