826 results on '"symbolic execution"'
Search Results
2. ATIU: An Automated Method for Testing Embedded C/C++ Projects Containing Incomplete Units
3. Hevm, a Fast Symbolic Execution Framework for EVM Bytecode
4. Verification Algorithms for Automated Separation Logic Verifiers
5. On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
6. FDSE: Enhance Symbolic Execution by Fuzzing-based Pre-Analysis (Competition Contribution)
7. KLEEF: Symbolic Execution Engine (Competition Contribution)
8. AISE: A Symbolic Verifier by Synergizing Abstract Interpretation and Symbolic Execution (Competition Contribution)
9. Automated Software Verification of Hyperliveness
10. Verification
11. DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining
12. Symbolic Path-Guided Test Cases for Models with Data and Time
13. Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis
14. Detecting Privileged Parties on Ethereum
15. Comparison between Performance of Constraint Solver for Prediction Model in Symbolic Execution
16. Affinitree: A Compositional Framework for Formal Analysis and Explanation of Deep Neural Networks
17. Denotational Semantics for Symbolic Execution
18. Guiding Symbolic Execution with A-Star
19. Towards Efficient Data-Flow Test Data Generation
20. Computer-Aided Reverse Engineering of Protected Software
21. Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation
22. Automated Synthesis of Software Contracts with KindSpec
23. Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis
24. Adversarial Reachability for Program-level Security Analysis
25. Equivalence Checking of Code Transformation by Numerical and Symbolic Approaches
26. symQV: Automated Symbolic Verification of Quantum Programs
27. Malware Analysis with Symbolic Execution and Graph Kernel
28. Building SSA in a Compiler for PHP
29. SKLEE: A Dynamic Symbolic Analysis Tool for Ethereum Smart Contracts (Tool Paper)
30. A Guided Search for Races Based on Data Flow Patterns
31. Test Suite Augmentation for Reconfigurable PLC Software in the Internet of Production
32. Generation Method of Nuclear Power DCS Integrated Test Case Based on Symbolic Execution
33. A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks
34. Testing Vehicle-Mounted Systems: A Stepwise Symbolic Execution Approach for OSEK/VDX Programs
35. A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
36. A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)
37. Scheduling Complexity of Interleaving Search
38. LART: Compiled Abstract Execution : (Competition Contribution)
39. FuSeBMC v4: Smart Seed Generation for Hybrid Fuzzing : (Competition Contribution)
40. Smart Contract Vulnerability Detection Based on Symbolic Execution Technology
41. Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example
42. A Safe and Effective Tuning Technique for Similarity-Based Fuzzy Logic Programs
43. Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes
44. Pointer Program Synthesis as Non-deterministic Planning
45. Towards Verifying SHA256 in OpenSSL with the Software Analysis Workbench
46. FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)
47. BinSEAL: Linux Binary Obfuscation Against Symbolic Execution
48. Verifying Weakly Consistent Transactional Programs Using Symbolic Execution
49. Register-Transfer Level Correspondence Analysis
50. Verification of Embedded Software Binaries using Virtual Prototypes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.