Results 41 to 50 of about 211,276 (289)

Symbolic execution for randomized programs

open access: yesProceedings of the ACM on Programming Languages, 2022
We propose a symbolic execution method for programs that can draw random samples. In contrast to existing work, our method can verify randomized programs with unknown inputs and can prove probabilistic properties that universally quantify over all possible inputs. Our technique augments standard symbolic execution with a new class of
Zachary Susag   +3 more
openaire   +2 more sources

Research on construction of conditional exception code used in branch obfuscation

open access: yes网络与信息安全学报, 2020
Using conditional exception code construction and exception handler to replace conditional jump code, the branch obfuscation get the right branch selection, but the address of branch point was concealed, so this obfuscation method can defeat symbolic ...
GENG Pu, ZHU Yuefei
doaj   +3 more sources

Employing Dynamic Symbolic Execution for Equivalent Mutant Detection

open access: yesIEEE Access, 2019
Equivalent mutants (EM) issue is a key challenge in mutation testing. Many methods were applied for detecting and reducing the equivalent mutants. These methods are classified into four classes: equivalent mutant detection, avoiding the generation of ...
Ahmed S. Ghiduk   +2 more
doaj   +1 more source

Exploratory Review of Hybrid Fuzzing for Automated Vulnerability Detection

open access: yesIEEE Access, 2021
Recently, software testing has become a significant component of information security. The most reliable technique for automated software testing is a fuzzing tool that feeds programs with random test-input and detects software vulnerabilities that are ...
Fayozbek Rustamov   +3 more
doaj   +1 more source

Symbolic execution formally explained [PDF]

open access: yesFormal Aspects of Computing, 2021
Abstract In this paper, we provide a formal explanation of symbolic execution in terms of a symbolic transition system and prove its correctness and completeness with respect to an operational semantics which models the execution on concrete values.We first introduce a formalmodel for a basic programming languagewith a statically fixed number
Boer, F.S. de, Bonsangue, M.M.
openaire   +2 more sources

Formalization of Error Criteria for static symbolic execution

open access: yesТруды Института системного программирования РАН, 2018
This paper is devoted to the formalization of the error criteria for program static analysis, based on symbolic execution. Using the original error criteria of symbolic execution approach in program static analysis leads to an excessive number of false ...
V. K. Koshelev
doaj   +1 more source

Security protocol code analysis method combining model learning and symbolic execution

open access: yes网络与信息安全学报, 2021
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path ...
ZHANG Xieli, ZHU Yuefei, GU Chunxiang, CHEN Xi
doaj   +3 more sources

Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding [PDF]

open access: yes, 2010
High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools.
Dunkels, Adam   +4 more
core   +2 more sources

Compact Symbolic Execution [PDF]

open access: yes, 2013
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It proceeds in two steps. First, we analyse cyclic paths in the control flow graph of a given program, independently from the rest of the program. Our goal is to compute a so called template for each such a cyclic path.
Slabý, Jiří   +2 more
openaire   +2 more sources

PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution [PDF]

open access: yesJisuanji kexue
The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means to determine the maliciousness of the documents.However,attackers can adopt high obfuscation ...
SONG Enzhou, HU Tao, YI Peng, WANG Wenbo
doaj   +1 more source

Home - About - Disclaimer - Privacy