Results 71 to 80 of about 1,018,291 (234)

Smart Contract Reentrancy Vulnerability Detection Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng
The exploitation of reentrancy vulnerabilities represents one of the most destructive attacks among the security issues related to smart contracts. Existing methods often suffer from high false negative rates. To address these issues, this paper proposes
GAO Shan, WANG Chengyu, BI Chengming, ZHU Tieying
doaj   +1 more source

Detection Method for Heap Overflow fastbin Attack Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng, 2020
The existing automatic detection systems for software vulnerabilities fail to automatically detect the programs with heap overflow vulnerabilities.To address the problem,this paper proposes an automatic detection method for heap overflow fastbin attacks ...
ZHAO Chao, PAN Zulie, FAN Jing
doaj   +1 more source

Symbolic Worst Case Execution Times [PDF]

open access: yes, 2011
In immediate or hard real-time systems the correctness of an operation depends not only upon its logical correctness, but also on the time in which it is computed. In such systems, it is imperative that operations are performed within a given deadline because missing this deadline constitutes the failure of the complete system.
Althaus, Ernst   +2 more
openaire   +2 more sources

Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2019
The constant-time programming discipline (CT) is an efficient countermeasure against timing side-channel attacks, requiring the control flow and the memory accesses to be independent from the secrets.
Lesly-Ann Daniel   +2 more
semanticscholar   +1 more source

Combining dynamic symbolic execution, code static analysis and fuzzing

open access: yesТруды Института системного программирования РАН, 2019
This paper describes a new approach for dynamic code analysis. It combines dynamic symbolic execution and static code analysis with fuzzing to increase efficiency of each component.
A. Yu. Gerasimov   +5 more
doaj   +1 more source

SPOT: Testing Stream Processing Programs with Symbolic Execution and Stream Synthesizing

open access: yesApplied Sciences, 2021
Adoption of distributed stream processing (DSP) systems such as Apache Flink in real-time big data processing is increasing. However, DSP programs are prone to be buggy, especially when one programmer neglects some DSP features (e.g., source data ...
Qian Ye, Minyan Lu
doaj   +1 more source

Symbolic Execution Techniques Extended to Systems. [PDF]

open access: yes, 2009
International audienceThis paper presents a symbolic execution framework devoted to system models, recursively defined by interconnecting component models.
Aiguier, Marc   +3 more
core   +2 more sources

Statistical Symbolic Execution with Informed Sampling [PDF]

open access: yes, 2014
Symbolic execution techniques have been proposed recently for the probabilistic analysis of programs. These techniques seek to quantify the likelihood of reaching program events of interest, e.g., assert violations.
Filieri, Antonio   +3 more
core   +2 more sources

Gillian, part i: a multi-language platform for symbolic execution

open access: yesACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2020
We introduce Gillian, a platform for developing symbolic analysis tools for programming languages. Here, we focus on the symbolic execution engine at the heart of Gillian, which is parametric on the memory model of the target language.
J. Santos   +3 more
semanticscholar   +1 more source

Binary Analysis Using Symbolic Execution

open access: yesБезопасность информационных технологий, 2010
This paper presents a method of static analysis of executable code that combines abstract interpretation and symbolic execution, where the latter is used in order to refine results of the former.
I. O. Leoshkevich
doaj  

Home - About - Disclaimer - Privacy