Results 51 to 60 of about 970,866 (376)
Research on construction of conditional exception code used in branch obfuscation
Using conditional exception code construction and exception handler to replace conditional jump code, the branch obfuscation get the right branch selection, but the address of branch point was concealed, so this obfuscation method can defeat symbolic ...
GENG Pu, ZHU Yuefei
doaj +3 more sources
Exploratory Review of Hybrid Fuzzing for Automated Vulnerability Detection
Recently, software testing has become a significant component of information security. The most reliable technique for automated software testing is a fuzzing tool that feeds programs with random test-input and detects software vulnerabilities that are ...
Fayozbek Rustamov +3 more
doaj +1 more source
Formalization of Error Criteria for static symbolic execution
This paper is devoted to the formalization of the error criteria for program static analysis, based on symbolic execution. Using the original error criteria of symbolic execution approach in program static analysis leads to an excessive number of false ...
V. K. Koshelev
doaj +1 more source
Security protocol code analysis method combining model learning and symbolic execution
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path ...
ZHANG Xieli, ZHU Yuefei, GU Chunxiang, CHEN Xi
doaj +3 more sources
Compact Symbolic Execution [PDF]
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It proceeds in two steps. First, we analyse cyclic paths in the control flow graph of a given program, independently from the rest of the program. Our goal is to compute a so called template for each such a cyclic path.
Slabý, Jiří +2 more
openaire +2 more sources
PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution [PDF]
The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means to determine the maliciousness of the documents.However,attackers can adopt high obfuscation ...
SONG Enzhou, HU Tao, YI Peng, WANG Wenbo
doaj +1 more source
Killing Stubborn Mutants with Symbolic Execution [PDF]
We introduce SEMu, a Dynamic Symbolic Execution technique that generates test inputs capable of killing stubborn mutants (killable mutants that remain undetected after a reasonable amount of testing). SEMu aims at mutant propagation (triggering erroneous
T. Chekam +3 more
semanticscholar +1 more source
Ffuzz: Towards full system high coverage fuzz testing on binary executables. [PDF]
Bugs and vulnerabilities in binary executables threaten cyber security. Current discovery methods, like fuzz testing, symbolic execution and manual analysis, both have advantages and disadvantages when exercising the deeper code area in binary ...
Bin Zhang +4 more
doaj +1 more source
Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
We describe a technique for systematic testing of multi-threaded programs. We combine Quasi-Optimal Partial-Order Reduction, a state-of-the-art technique that tackles path explosion due to interleaving non-determinism, with symbolic execution to handle ...
A Farzan +22 more
core +1 more source
Shadow symbolic execution for better testing of evolving software [PDF]
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic execution. At a high-level, our technique runs two different program versions in the same symbolic execution instance, with the old version effectively ...
Cadar, C, Palikareva, H
core +2 more sources

