Results 31 to 40 of about 211,276 (289)

Symbolic Execution as DPLL Modulo Theories [PDF]

open access: yes, 2014
© Quoc-Sang Phan; licensed under Creative Commons License CC-BY. Imperial College Computing Student Workshop (ICCSW’14). Editors: Rumyana Neykova and Nicholas Ng; pp. 58–65. OpenAccess Series in Informatics.
Phan, Q-S
core   +2 more sources

Rethinking Pointer Reasoning in Symbolic Execution [PDF]

open access: yes, 2017
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may quickly run out of
Coppa, Emilio   +2 more
core   +1 more source

Shadow symbolic execution for better testing of evolving software [PDF]

open access: yes, 2014
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic execution. At a high-level, our technique runs two different program versions in the same symbolic execution instance, with the old version effectively ...
Cadar, C, Palikareva, H
core   +2 more sources

Patch-Related Vulnerability Detection Based on Symbolic Execution

open access: yesIEEE Access, 2017
During the lifecycle of a software system, software patches are committed to software repositories to fix discovered bugs or append new features. Unfortunately, the patches may bring new bugs or vulnerabilities, which could break the stability and ...
Weizhong Qiang   +5 more
doaj   +1 more source

Quantifying Information Leaks Using Reliability Analysis [PDF]

open access: yes, 2014
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic
d Amorim, M   +4 more
core   +1 more source

VERIFICATION OF DYNAMIC MEMORY ALLOCATORS BASED ON SYMBOLIC PROGRAM EXECUTION [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
Subject of Research. The paper presents the study of vulnerability exploitation techniques in the implementation of dynamic memory allocation algorithms (glibc library allocator): Poisoned Null-byte, Overlapped Chunks, Fastbin Attack, Unsafe Unlink ...
Andrey M. Dergachev   +4 more
doaj   +1 more source

Dynamic analysis of programs with graphical user interface based on symbolic execution

open access: yesТруды Института системного программирования РАН, 2018
In this paper, we explore the possibilities of applying dynamic symbolic execution (or concolic testing) methods to applications with graphical user interfaces.
S. P. Vartanov   +4 more
doaj   +1 more source

Python Attack Script Analysis Platform Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng, 2016
The traditional static analysis method cannot handle the interaction between the script and the network,and it introduces inaccessible path.The dynamic analysis needs to set up the experimental environment and needs manual analysis.To solve these ...
QIU Yang,WANG Yijun,XUE Zhi
doaj   +1 more source

Symbolic execution proofs for higher order store programs [PDF]

open access: yes, 2014
Higher order store programs are programs which store, manipulate and invoke code at runtime. Important examples of higher order store programs include operating system kernels which dynamically load and unload kernel modules.
Charlton, Nathaniel   +2 more
core   +1 more source

Guiding dynamic symbolic execution toward unverified program executions [PDF]

open access: yesProceedings of the 38th International Conference on Software Engineering, 2016
ISBN:978-1-4503-4205 ...
Christakis, Maria   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy