Results 51 to 60 of about 1,018,291 (234)

Formalization of Error Criteria for static symbolic execution

open access: yesТруды Института системного программирования РАН, 2018
This paper is devoted to the formalization of the error criteria for program static analysis, based on symbolic execution. Using the original error criteria of symbolic execution approach in program static analysis leads to an excessive number of false ...
V. K. Koshelev
doaj   +1 more source

Security protocol code analysis method combining model learning and symbolic execution

open access: yes网络与信息安全学报, 2021
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path ...
ZHANG Xieli, ZHU Yuefei, GU Chunxiang, CHEN Xi
doaj   +3 more sources

Compact Symbolic Execution [PDF]

open access: yes, 2013
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It proceeds in two steps. First, we analyse cyclic paths in the control flow graph of a given program, independently from the rest of the program. Our goal is to compute a so called template for each such a cyclic path.
Slabý, Jiří   +2 more
openaire   +2 more sources

PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution [PDF]

open access: yesJisuanji kexue
The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means to determine the maliciousness of the documents.However,attackers can adopt high obfuscation ...
SONG Enzhou, HU Tao, YI Peng, WANG Wenbo
doaj   +1 more source

Ffuzz: Towards full system high coverage fuzz testing on binary executables. [PDF]

open access: yesPLoS ONE, 2018
Bugs and vulnerabilities in binary executables threaten cyber security. Current discovery methods, like fuzz testing, symbolic execution and manual analysis, both have advantages and disadvantages when exercising the deeper code area in binary ...
Bin Zhang   +4 more
doaj   +1 more source

Killing Stubborn Mutants with Symbolic Execution [PDF]

open access: yesACM Transactions on Software Engineering and Methodology, 2020
We introduce SEMu, a Dynamic Symbolic Execution technique that generates test inputs capable of killing stubborn mutants (killable mutants that remain undetected after a reasonable amount of testing). SEMu aims at mutant propagation (triggering erroneous
T. Chekam   +3 more
semanticscholar   +1 more source

Shadow symbolic execution for better testing of evolving software [PDF]

open access: yes, 2014
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic execution. At a high-level, our technique runs two different program versions in the same symbolic execution instance, with the old version effectively ...
Cadar, C, Palikareva, H
core   +2 more sources

Generation of the weakest preconditions of programs with dynamic memory in symbolic execution

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Symbolic execution is a widely used method for the systematic study of program execution paths; it allows solving a number of important problems related to verification of correctness: searching for errors and vulnerabilities, automatic test generation ...
A. V. Misonizhnik   +4 more
doaj   +1 more source

Directed Symbolic Execution [PDF]

open access: yes, 2011
In this paper, we study the problem of automatically finding program executions that reach a particular target line. This problem arises in many debugging scenarios; for example, a developer may want to confirm that a bug reported by a static analysis tool on a particular line is a true positive.
Kin-Keung Ma   +3 more
openaire   +1 more source

Test Readability Optimization in Context of Symbolic Execution

open access: yesТруды Института системного программирования РАН, 2018
Software testing is a time consuming process. In general, software companies spend about 50% of development time on testing. On the other hand, lack of testing implies financial and other risks.
I. A. Yakimov, A. S. Kuznetsov
doaj   +1 more source

Home - About - Disclaimer - Privacy