Results 51 to 60 of about 211,276 (289)

Chopped symbolic execution

open access: yesProceedings of the 40th International Conference on Software Engineering, 2018
Symbolic execution is a powerful program analysis technique that systematically explores multiple program paths. However, despite important technical advances, symbolic execution often struggles to reach deep parts of the code due to the well-known path explosion problem and constraint solving limitations.
Trabish, D   +3 more
openaire   +2 more sources

Detection Method for Heap Overflow fastbin Attack Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng, 2020
The existing automatic detection systems for software vulnerabilities fail to automatically detect the programs with heap overflow vulnerabilities.To address the problem,this paper proposes an automatic detection method for heap overflow fastbin attacks ...
ZHAO Chao, PAN Zulie, FAN Jing
doaj   +1 more source

Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]

open access: yes, 2014
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security   +2 more
core   +1 more source

The cooperative regulation of miR‐221 by APE1 and AUF1 impacts p27Kip1 defining a miR signature relevant for cervical cancer

open access: yesFEBS Open Bio, EarlyView.
A regulatory axis involving APE1, AUF1, and miR‐221 is proposed. Pri‐miR‐221 is processed by DROSHA and DICER to generate mature miR‐221, which targets p27Kip1 mRNA. APE1 and AUF1 compete for pre‐miR‐221 binding. Reduced APE1/AUF1 levels impair miR‐221 biogenesis, decrease p27Kip1 mRNA degradation, and promote cell cycle progression, chemoresistance ...
Matilde Clarissa Malfatti   +3 more
wiley   +1 more source

Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach

open access: yes, 2017
Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all ...
Hutzelmann, Thomas   +3 more
core   +1 more source

CSF Monoamine Metabolites and Cognitive Trajectory in Early Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Imaging and postmortem studies indicate that abnormalities in monoaminergic neurotransmission contribute to cognitive impairment in Parkinson's disease (PD). However, it remains uncertain if cerebrospinal fluid (CSF) monoamine metabolites can serve as biomarkers of cognitive decline in early PD.
Jing‐Yu Shao   +7 more
wiley   +1 more source

Smart Contract Reentrancy Vulnerability Detection Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng
The exploitation of reentrancy vulnerabilities represents one of the most destructive attacks among the security issues related to smart contracts. Existing methods often suffer from high false negative rates. To address these issues, this paper proposes
GAO Shan, WANG Chengyu, BI Chengming, ZHU Tieying
doaj   +1 more source

Symbolic Worst Case Execution Times [PDF]

open access: yes, 2011
In immediate or hard real-time systems the correctness of an operation depends not only upon its logical correctness, but also on the time in which it is computed. In such systems, it is imperative that operations are performed within a given deadline because missing this deadline constitutes the failure of the complete system.
Althaus, Ernst   +2 more
openaire   +2 more sources

SPG4 and Dementia: Expanding the Clinical Spectrum

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Hereditary spastic paraplegia (HSP) is a group of disorders characterized by progressive spasticity and lower limb weakness, with mutations in SPG4/SPAST being the most common cause. Detailed studies and clinical and molecular comparisons across different populations are missing.
Emanuele Panza   +19 more
wiley   +1 more source

Combining dynamic symbolic execution, code static analysis and fuzzing

open access: yesТруды Института системного программирования РАН, 2019
This paper describes a new approach for dynamic code analysis. It combines dynamic symbolic execution and static code analysis with fuzzing to increase efficiency of each component.
A. Yu. Gerasimov   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy