829 results on '"symbolic execution"'
Search Results
2. Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis
3. CyMed: A Framework for Testing Connected Medical Devices
4. Affinitree: A Compositional Framework for Formal Analysis and Explanation of Deep Neural Networks
5. SAEG: Stateful Automatic Exploit Generation
6. ATIU: An Automated Method for Testing Embedded C/C++ Projects Containing Incomplete Units
7. Hevm, a Fast Symbolic Execution Framework for EVM Bytecode
8. Verification Algorithms for Automated Separation Logic Verifiers
9. On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
10. FDSE: Enhance Symbolic Execution by Fuzzing-based Pre-Analysis (Competition Contribution)
11. KLEEF: Symbolic Execution Engine (Competition Contribution)
12. AISE: A Symbolic Verifier by Synergizing Abstract Interpretation and Symbolic Execution (Competition Contribution)
13. Automated Software Verification of Hyperliveness
14. Verification
15. DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining
16. Symbolic Path-Guided Test Cases for Models with Data and Time
17. Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis
18. Detecting Privileged Parties on Ethereum
19. Comparison between Performance of Constraint Solver for Prediction Model in Symbolic Execution
20. Denotational Semantics for Symbolic Execution
21. Guiding Symbolic Execution with A-Star
22. Towards Efficient Data-Flow Test Data Generation
23. Computer-Aided Reverse Engineering of Protected Software
24. Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation
25. Automated Synthesis of Software Contracts with KindSpec
26. Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis
27. Adversarial Reachability for Program-level Security Analysis
28. Equivalence Checking of Code Transformation by Numerical and Symbolic Approaches
29. symQV: Automated Symbolic Verification of Quantum Programs
30. Malware Analysis with Symbolic Execution and Graph Kernel
31. Building SSA in a Compiler for PHP
32. SKLEE: A Dynamic Symbolic Analysis Tool for Ethereum Smart Contracts (Tool Paper)
33. A Guided Search for Races Based on Data Flow Patterns
34. Test Suite Augmentation for Reconfigurable PLC Software in the Internet of Production
35. Generation Method of Nuclear Power DCS Integrated Test Case Based on Symbolic Execution
36. A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks
37. Testing Vehicle-Mounted Systems: A Stepwise Symbolic Execution Approach for OSEK/VDX Programs
38. A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
39. A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)
40. Scheduling Complexity of Interleaving Search
41. LART: Compiled Abstract Execution : (Competition Contribution)
42. FuSeBMC v4: Smart Seed Generation for Hybrid Fuzzing : (Competition Contribution)
43. Smart Contract Vulnerability Detection Based on Symbolic Execution Technology
44. Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example
45. A Safe and Effective Tuning Technique for Similarity-Based Fuzzy Logic Programs
46. Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes
47. Pointer Program Synthesis as Non-deterministic Planning
48. Towards Verifying SHA256 in OpenSSL with the Software Analysis Workbench
49. FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)
50. BinSEAL: Linux Binary Obfuscation Against Symbolic Execution
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.