Search

Your search keyword '"symbolic execution"' showing total 829 results

Search Constraints

Start Over You searched for: Descriptor "symbolic execution" Remove constraint Descriptor: "symbolic execution" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
829 results on '"symbolic execution"'

Search Results

2. Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis

5. SAEG: Stateful Automatic Exploit Generation

6. ATIU: An Automated Method for Testing Embedded C/C++ Projects Containing Incomplete Units

7. Hevm, a Fast Symbolic Execution Framework for EVM Bytecode

8. Verification Algorithms for Automated Separation Logic Verifiers

9. On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr

11. KLEEF: Symbolic Execution Engine (Competition Contribution)

15. DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining

16. Symbolic Path-Guided Test Cases for Models with Data and Time

18. Detecting Privileged Parties on Ethereum

19. Comparison between Performance of Constraint Solver for Prediction Model in Symbolic Execution

20. Denotational Semantics for Symbolic Execution

21. Guiding Symbolic Execution with A-Star

22. Towards Efficient Data-Flow Test Data Generation

23. Computer-Aided Reverse Engineering of Protected Software

24. Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation

25. Automated Synthesis of Software Contracts with KindSpec

26. Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis

27. Adversarial Reachability for Program-level Security Analysis

28. Equivalence Checking of Code Transformation by Numerical and Symbolic Approaches

29. symQV: Automated Symbolic Verification of Quantum Programs

30. Malware Analysis with Symbolic Execution and Graph Kernel

33. A Guided Search for Races Based on Data Flow Patterns

35. Generation Method of Nuclear Power DCS Integrated Test Case Based on Symbolic Execution

39. A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)

40. Scheduling Complexity of Interleaving Search

41. LART: Compiled Abstract Execution : (Competition Contribution)

42. FuSeBMC v4: Smart Seed Generation for Hybrid Fuzzing : (Competition Contribution)

45. A Safe and Effective Tuning Technique for Similarity-Based Fuzzy Logic Programs

46. Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes

47. Pointer Program Synthesis as Non-deterministic Planning

48. Towards Verifying SHA256 in OpenSSL with the Software Analysis Workbench

49. FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)

50. BinSEAL: Linux Binary Obfuscation Against Symbolic Execution

Catalog

Books, media, physical & digital resources