Results 41 to 50 of about 970,866 (376)

Quantifying Information Leaks Using Reliability Analysis [PDF]

open access: yes, 2014
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic
d Amorim, M   +4 more
core   +1 more source

SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning

open access: yesInternational Symposium on Recent Advances in Intrusion Detection, 2021
Exploring many execution paths in a binary program is essential to discover new vulnerabilities. Dynamic Symbolic Execution (DSE) is useful to trigger complex input conditions and enables an accurate exploration of a program while providing extensive ...
Nicola Ruaro   +8 more
semanticscholar   +1 more source

Patch-Related Vulnerability Detection Based on Symbolic Execution

open access: yesIEEE Access, 2017
During the lifecycle of a software system, software patches are committed to software repositories to fix discovered bugs or append new features. Unfortunately, the patches may bring new bugs or vulnerabilities, which could break the stability and ...
Weizhong Qiang   +5 more
doaj   +1 more source

Symbolic execution proofs for higher order store programs [PDF]

open access: yes, 2014
Higher order store programs are programs which store, manipulate and invoke code at runtime. Important examples of higher order store programs include operating system kernels which dynamically load and unload kernel modules.
Charlton, Nathaniel   +2 more
core   +1 more source

Dynamic analysis of programs with graphical user interface based on symbolic execution

open access: yesТруды Института системного программирования РАН, 2018
In this paper, we explore the possibilities of applying dynamic symbolic execution (or concolic testing) methods to applications with graphical user interfaces.
S. P. Vartanov   +4 more
doaj   +1 more source

VERIFICATION OF DYNAMIC MEMORY ALLOCATORS BASED ON SYMBOLIC PROGRAM EXECUTION [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
Subject of Research. The paper presents the study of vulnerability exploitation techniques in the implementation of dynamic memory allocation algorithms (glibc library allocator): Poisoned Null-byte, Overlapped Chunks, Fastbin Attack, Unsafe Unlink ...
Andrey M. Dergachev   +4 more
doaj   +1 more source

Type and interval aware array constraint solving for symbolic execution

open access: yesInternational Symposium on Software Testing and Analysis, 2021
Array constraints are prevalent in analyzing a program with symbolic execution. Solving array constraints is challenging due to the complexity of the precise encoding for arrays.
Ziqi Shuai   +4 more
semanticscholar   +1 more source

Employing Dynamic Symbolic Execution for Equivalent Mutant Detection

open access: yesIEEE Access, 2019
Equivalent mutants (EM) issue is a key challenge in mutation testing. Many methods were applied for detecting and reducing the equivalent mutants. These methods are classified into four classes: equivalent mutant detection, avoiding the generation of ...
Ahmed S. Ghiduk   +2 more
doaj   +1 more source

Python Attack Script Analysis Platform Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng, 2016
The traditional static analysis method cannot handle the interaction between the script and the network,and it introduces inaccessible path.The dynamic analysis needs to set up the experimental environment and needs manual analysis.To solve these ...
QIU Yang,WANG Yijun,XUE Zhi
doaj   +1 more source

Guiding dynamic symbolic execution toward unverified program executions [PDF]

open access: yesProceedings of the 38th International Conference on Software Engineering, 2016
ISBN:978-1-4503-4205 ...
Christakis, Maria   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy