Results 51 to 60 of about 211,276 (289)
Symbolic execution is a powerful program analysis technique that systematically explores multiple program paths. However, despite important technical advances, symbolic execution often struggles to reach deep parts of the code due to the well-known path explosion problem and constraint solving limitations.
Trabish, D +3 more
openaire +2 more sources
Detection Method for Heap Overflow fastbin Attack Based on Symbolic Execution [PDF]
The existing automatic detection systems for software vulnerabilities fail to automatically detect the programs with heap overflow vulnerabilities.To address the problem,this paper proposes an automatic detection method for heap overflow fastbin attacks ...
ZHAO Chao, PAN Zulie, FAN Jing
doaj +1 more source
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security +2 more
core +1 more source
A regulatory axis involving APE1, AUF1, and miR‐221 is proposed. Pri‐miR‐221 is processed by DROSHA and DICER to generate mature miR‐221, which targets p27Kip1 mRNA. APE1 and AUF1 compete for pre‐miR‐221 binding. Reduced APE1/AUF1 levels impair miR‐221 biogenesis, decrease p27Kip1 mRNA degradation, and promote cell cycle progression, chemoresistance ...
Matilde Clarissa Malfatti +3 more
wiley +1 more source
Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach
Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all ...
Hutzelmann, Thomas +3 more
core +1 more source
CSF Monoamine Metabolites and Cognitive Trajectory in Early Parkinson's Disease
ABSTRACT Background Imaging and postmortem studies indicate that abnormalities in monoaminergic neurotransmission contribute to cognitive impairment in Parkinson's disease (PD). However, it remains uncertain if cerebrospinal fluid (CSF) monoamine metabolites can serve as biomarkers of cognitive decline in early PD.
Jing‐Yu Shao +7 more
wiley +1 more source
Smart Contract Reentrancy Vulnerability Detection Based on Symbolic Execution [PDF]
The exploitation of reentrancy vulnerabilities represents one of the most destructive attacks among the security issues related to smart contracts. Existing methods often suffer from high false negative rates. To address these issues, this paper proposes
GAO Shan, WANG Chengyu, BI Chengming, ZHU Tieying
doaj +1 more source
Symbolic Worst Case Execution Times [PDF]
In immediate or hard real-time systems the correctness of an operation depends not only upon its logical correctness, but also on the time in which it is computed. In such systems, it is imperative that operations are performed within a given deadline because missing this deadline constitutes the failure of the complete system.
Althaus, Ernst +2 more
openaire +2 more sources
SPG4 and Dementia: Expanding the Clinical Spectrum
ABSTRACT Objective Hereditary spastic paraplegia (HSP) is a group of disorders characterized by progressive spasticity and lower limb weakness, with mutations in SPG4/SPAST being the most common cause. Detailed studies and clinical and molecular comparisons across different populations are missing.
Emanuele Panza +19 more
wiley +1 more source
Combining dynamic symbolic execution, code static analysis and fuzzing
This paper describes a new approach for dynamic code analysis. It combines dynamic symbolic execution and static code analysis with fuzzing to increase efficiency of each component.
A. Yu. Gerasimov +5 more
doaj +1 more source

