Results 31 to 40 of about 211,276 (289)
Symbolic Execution as DPLL Modulo Theories [PDF]
© Quoc-Sang Phan; licensed under Creative Commons License CC-BY. Imperial College Computing Student Workshop (ICCSW’14). Editors: Rumyana Neykova and Nicholas Ng; pp. 58–65. OpenAccess Series in Informatics.
Phan, Q-S
core +2 more sources
Rethinking Pointer Reasoning in Symbolic Execution [PDF]
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may quickly run out of
Coppa, Emilio +2 more
core +1 more source
Shadow symbolic execution for better testing of evolving software [PDF]
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic execution. At a high-level, our technique runs two different program versions in the same symbolic execution instance, with the old version effectively ...
Cadar, C, Palikareva, H
core +2 more sources
Patch-Related Vulnerability Detection Based on Symbolic Execution
During the lifecycle of a software system, software patches are committed to software repositories to fix discovered bugs or append new features. Unfortunately, the patches may bring new bugs or vulnerabilities, which could break the stability and ...
Weizhong Qiang +5 more
doaj +1 more source
Quantifying Information Leaks Using Reliability Analysis [PDF]
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic
d Amorim, M +4 more
core +1 more source
VERIFICATION OF DYNAMIC MEMORY ALLOCATORS BASED ON SYMBOLIC PROGRAM EXECUTION [PDF]
Subject of Research. The paper presents the study of vulnerability exploitation techniques in the implementation of dynamic memory allocation algorithms (glibc library allocator): Poisoned Null-byte, Overlapped Chunks, Fastbin Attack, Unsafe Unlink ...
Andrey M. Dergachev +4 more
doaj +1 more source
Dynamic analysis of programs with graphical user interface based on symbolic execution
In this paper, we explore the possibilities of applying dynamic symbolic execution (or concolic testing) methods to applications with graphical user interfaces.
S. P. Vartanov +4 more
doaj +1 more source
Python Attack Script Analysis Platform Based on Symbolic Execution [PDF]
The traditional static analysis method cannot handle the interaction between the script and the network,and it introduces inaccessible path.The dynamic analysis needs to set up the experimental environment and needs manual analysis.To solve these ...
QIU Yang,WANG Yijun,XUE Zhi
doaj +1 more source
Symbolic execution proofs for higher order store programs [PDF]
Higher order store programs are programs which store, manipulate and invoke code at runtime. Important examples of higher order store programs include operating system kernels which dynamically load and unload kernel modules.
Charlton, Nathaniel +2 more
core +1 more source
Guiding dynamic symbolic execution toward unverified program executions [PDF]
ISBN:978-1-4503-4205 ...
Christakis, Maria +2 more
openaire +2 more sources

