Results 41 to 50 of about 970,866 (376)
Quantifying Information Leaks Using Reliability Analysis [PDF]
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic
d Amorim, M +4 more
core +1 more source
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
Exploring many execution paths in a binary program is essential to discover new vulnerabilities. Dynamic Symbolic Execution (DSE) is useful to trigger complex input conditions and enables an accurate exploration of a program while providing extensive ...
Nicola Ruaro +8 more
semanticscholar +1 more source
Patch-Related Vulnerability Detection Based on Symbolic Execution
During the lifecycle of a software system, software patches are committed to software repositories to fix discovered bugs or append new features. Unfortunately, the patches may bring new bugs or vulnerabilities, which could break the stability and ...
Weizhong Qiang +5 more
doaj +1 more source
Symbolic execution proofs for higher order store programs [PDF]
Higher order store programs are programs which store, manipulate and invoke code at runtime. Important examples of higher order store programs include operating system kernels which dynamically load and unload kernel modules.
Charlton, Nathaniel +2 more
core +1 more source
Dynamic analysis of programs with graphical user interface based on symbolic execution
In this paper, we explore the possibilities of applying dynamic symbolic execution (or concolic testing) methods to applications with graphical user interfaces.
S. P. Vartanov +4 more
doaj +1 more source
VERIFICATION OF DYNAMIC MEMORY ALLOCATORS BASED ON SYMBOLIC PROGRAM EXECUTION [PDF]
Subject of Research. The paper presents the study of vulnerability exploitation techniques in the implementation of dynamic memory allocation algorithms (glibc library allocator): Poisoned Null-byte, Overlapped Chunks, Fastbin Attack, Unsafe Unlink ...
Andrey M. Dergachev +4 more
doaj +1 more source
Type and interval aware array constraint solving for symbolic execution
Array constraints are prevalent in analyzing a program with symbolic execution. Solving array constraints is challenging due to the complexity of the precise encoding for arrays.
Ziqi Shuai +4 more
semanticscholar +1 more source
Employing Dynamic Symbolic Execution for Equivalent Mutant Detection
Equivalent mutants (EM) issue is a key challenge in mutation testing. Many methods were applied for detecting and reducing the equivalent mutants. These methods are classified into four classes: equivalent mutant detection, avoiding the generation of ...
Ahmed S. Ghiduk +2 more
doaj +1 more source
Python Attack Script Analysis Platform Based on Symbolic Execution [PDF]
The traditional static analysis method cannot handle the interaction between the script and the network,and it introduces inaccessible path.The dynamic analysis needs to set up the experimental environment and needs manual analysis.To solve these ...
QIU Yang,WANG Yijun,XUE Zhi
doaj +1 more source
Guiding dynamic symbolic execution toward unverified program executions [PDF]
ISBN:978-1-4503-4205 ...
Christakis, Maria +2 more
openaire +2 more sources

