Results 71 to 80 of about 970,866 (376)

Badger: Complexity Analysis with Fuzzing and Symbolic Execution

open access: yes, 2018
Hybrid testing approaches that involve fuzz testing and symbolic execution have shown promising results in achieving high code coverage, uncovering subtle errors and vulnerabilities in a variety of software applications. In this paper we describe Badger -
Ammons Glenn   +6 more
core   +1 more source

Chopped symbolic execution

open access: yesProceedings of the 40th International Conference on Software Engineering, 2018
Symbolic execution is a powerful program analysis technique that systematically explores multiple program paths. However, despite important technical advances, symbolic execution often struggles to reach deep parts of the code due to the well-known path explosion problem and constraint solving limitations.
Trabish, D   +3 more
openaire   +2 more sources

Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2019
The constant-time programming discipline (CT) is an efficient countermeasure against timing side-channel attacks, requiring the control flow and the memory accesses to be independent from the secrets.
Lesly-Ann Daniel   +2 more
semanticscholar   +1 more source

On the Automatic Analysis of the Practical Resistance of Obfusting Transformations

open access: yesМоделирование и анализ информационных систем, 2019
A method is developed for assessing the practical persistence of obfuscating transformations of programs based on the calculation of the similarity index for the original, obfuscated and deobfuscated programs.
Petr D. Borisov, Yu. V. Kosolapov
doaj   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Detection Method for Heap Overflow fastbin Attack Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng, 2020
The existing automatic detection systems for software vulnerabilities fail to automatically detect the programs with heap overflow vulnerabilities.To address the problem,this paper proposes an automatic detection method for heap overflow fastbin attacks ...
ZHAO Chao, PAN Zulie, FAN Jing
doaj   +1 more source

Basroparib inhibits YAP‐driven cancers by stabilizing angiomotin

open access: yesMolecular Oncology, EarlyView.
Basroparib, a selective tankyrase inhibitor, suppresses Wnt signaling and attenuates YAP‐driven oncogenic programs by stabilizing angiomotin. It promotes AMOT–YAP complex formation, enforces cytoplasmic YAP sequestration, inhibits YAP/TEAD transcription, and sensitizes YAP‐active cancers, including KRAS‐mutant colorectal cancer, to MEK inhibition.
Young‐Ju Kwon   +4 more
wiley   +1 more source

Smart Contract Reentrancy Vulnerability Detection Based on Symbolic Execution [PDF]

open access: yesJisuanji gongcheng
The exploitation of reentrancy vulnerabilities represents one of the most destructive attacks among the security issues related to smart contracts. Existing methods often suffer from high false negative rates. To address these issues, this paper proposes
GAO Shan, WANG Chengyu, BI Chengming, ZHU Tieying
doaj   +1 more source

Test Case Generation for Object-Oriented Imperative Languages in CLP

open access: yes, 2010
Testing is a vital part of the software development process. Test Case Generation (TCG) is the process of automatically generating a collection of test cases which are applied to a system under test.
Albert   +7 more
core   +1 more source

Symbolic Worst Case Execution Times [PDF]

open access: yes, 2011
In immediate or hard real-time systems the correctness of an operation depends not only upon its logical correctness, but also on the time in which it is computed. In such systems, it is imperative that operations are performed within a given deadline because missing this deadline constitutes the failure of the complete system.
Althaus, Ernst   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy