Results 31 to 40 of about 1,018,291 (234)
Directed Grey-box Fuzzing Test Technology Combining Mixed Symbolic Execution [PDF]
Directed Gray-box Fuzzing(DGF) test is a kind of fuzzing test technique which can quickly generate test cases to reach a given target area of the program and find vulnerabilities,but the existing DGF technique often fail to pass the checking statements ...
DAI Wei, LU Yuliang, ZHU Kailong
doaj +1 more source
Program Complexity Analysis Method Combining Evolutionary Algorithm with Symbolic Execution [PDF]
The worst case execution path is an important indicator of program complexity,which helps to discover possible complexity vulnerabilities in the system.In recent years,the application of symbolic execution in program complexity analysis has made great ...
ZHOU Sheng-yi, ZENG Hong-wei
doaj +1 more source
Self-composition by Symbolic Execution [PDF]
This work is licensed under a CC-BY Creative Commons Attribution 3.0 Unported license (http://creativecommons.org/licenses/by/3.0/)urn: urn:nbn:de:0030-drops-42770urn: urn:nbn:de:0030-drops-42770Self-composition is a logical formulation of non ...
Phan, Q-S
core +1 more source
Opaque Predicate Construction Algorithm Without Size Constraints [PDF]
Combined with opaque predicate,control flow obfuscation enables semantics-preserving transformations,which can achieve the purpose of code protection.However,existing opaque predicate is easily attacked by symbolic execution and has the problem of small ...
WANG Yufang, LE Deguang, Jack TAN, XIAO Le, GONG Shengrong
doaj +1 more source
Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE
Spectre are microarchitectural attacks which were made public in January 2018. They allow an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly important for cryptographic libraries and defenses at the software ...
Lesly-Ann Daniel +2 more
semanticscholar +1 more source
Rethinking Pointer Reasoning in Symbolic Execution [PDF]
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may quickly run out of
Coppa, Emilio +2 more
core +1 more source
Quantifying Information Leaks Using Reliability Analysis [PDF]
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic
d Amorim, M +4 more
core +1 more source
Patch-Related Vulnerability Detection Based on Symbolic Execution
During the lifecycle of a software system, software patches are committed to software repositories to fix discovered bugs or append new features. Unfortunately, the patches may bring new bugs or vulnerabilities, which could break the stability and ...
Weizhong Qiang +5 more
doaj +1 more source
Symbolic Execution as DPLL Modulo Theories [PDF]
© Quoc-Sang Phan; licensed under Creative Commons License CC-BY. Imperial College Computing Student Workshop (ICCSW’14). Editors: Rumyana Neykova and Nicholas Ng; pp. 58–65. OpenAccess Series in Informatics.
Phan, Q-S
core +2 more sources
VERIFICATION OF DYNAMIC MEMORY ALLOCATORS BASED ON SYMBOLIC PROGRAM EXECUTION [PDF]
Subject of Research. The paper presents the study of vulnerability exploitation techniques in the implementation of dynamic memory allocation algorithms (glibc library allocator): Poisoned Null-byte, Overlapped Chunks, Fastbin Attack, Unsafe Unlink ...
Andrey M. Dergachev +4 more
doaj +1 more source

