SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
Exploring many execution paths in a binary program is essential to discover new vulnerabilities. Dynamic Symbolic Execution (DSE) is useful to trigger complex input conditions and enables an accurate exploration of a program while providing extensive ...
Nicola Ruaro +8 more
semanticscholar +1 more source
Dynamic analysis of programs with graphical user interface based on symbolic execution
In this paper, we explore the possibilities of applying dynamic symbolic execution (or concolic testing) methods to applications with graphical user interfaces.
S. P. Vartanov +4 more
doaj +1 more source
Python Attack Script Analysis Platform Based on Symbolic Execution [PDF]
The traditional static analysis method cannot handle the interaction between the script and the network,and it introduces inaccessible path.The dynamic analysis needs to set up the experimental environment and needs manual analysis.To solve these ...
QIU Yang,WANG Yijun,XUE Zhi
doaj +1 more source
Symbolic execution proofs for higher order store programs [PDF]
Higher order store programs are programs which store, manipulate and invoke code at runtime. Important examples of higher order store programs include operating system kernels which dynamically load and unload kernel modules.
Charlton, Nathaniel +2 more
core +1 more source
Guiding dynamic symbolic execution toward unverified program executions [PDF]
ISBN:978-1-4503-4205 ...
Christakis, Maria +2 more
openaire +2 more sources
Type and interval aware array constraint solving for symbolic execution
Array constraints are prevalent in analyzing a program with symbolic execution. Solving array constraints is challenging due to the complexity of the precise encoding for arrays.
Ziqi Shuai +4 more
semanticscholar +1 more source
Research on construction of conditional exception code used in branch obfuscation
Using conditional exception code construction and exception handler to replace conditional jump code, the branch obfuscation get the right branch selection, but the address of branch point was concealed, so this obfuscation method can defeat symbolic ...
GENG Pu, ZHU Yuefei
doaj +3 more sources
Employing Dynamic Symbolic Execution for Equivalent Mutant Detection
Equivalent mutants (EM) issue is a key challenge in mutation testing. Many methods were applied for detecting and reducing the equivalent mutants. These methods are classified into four classes: equivalent mutant detection, avoiding the generation of ...
Ahmed S. Ghiduk +2 more
doaj +1 more source
Exploratory Review of Hybrid Fuzzing for Automated Vulnerability Detection
Recently, software testing has become a significant component of information security. The most reliable technique for automated software testing is a fuzzing tool that feeds programs with random test-input and detects software vulnerabilities that are ...
Fayozbek Rustamov +3 more
doaj +1 more source
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security +2 more
core +1 more source

