Search

Your search keyword '"symbolic execution"' showing total 826 results

Search Constraints

Start Over You searched for: Descriptor "symbolic execution" Remove constraint Descriptor: "symbolic execution" Publication Type eBooks Remove constraint Publication Type: eBooks
826 results on '"symbolic execution"'

Search Results

1. SAEG: Stateful Automatic Exploit Generation

2. ATIU: An Automated Method for Testing Embedded C/C++ Projects Containing Incomplete Units

3. Hevm, a Fast Symbolic Execution Framework for EVM Bytecode

4. Verification Algorithms for Automated Separation Logic Verifiers

5. On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr

7. KLEEF: Symbolic Execution Engine (Competition Contribution)

11. DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining

12. Symbolic Path-Guided Test Cases for Models with Data and Time

14. Detecting Privileged Parties on Ethereum

15. Comparison between Performance of Constraint Solver for Prediction Model in Symbolic Execution

17. Denotational Semantics for Symbolic Execution

18. Guiding Symbolic Execution with A-Star

19. Towards Efficient Data-Flow Test Data Generation

20. Computer-Aided Reverse Engineering of Protected Software

21. Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation

22. Automated Synthesis of Software Contracts with KindSpec

23. Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis

24. Adversarial Reachability for Program-level Security Analysis

25. Equivalence Checking of Code Transformation by Numerical and Symbolic Approaches

26. symQV: Automated Symbolic Verification of Quantum Programs

27. Malware Analysis with Symbolic Execution and Graph Kernel

30. A Guided Search for Races Based on Data Flow Patterns

32. Generation Method of Nuclear Power DCS Integrated Test Case Based on Symbolic Execution

36. A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)

37. Scheduling Complexity of Interleaving Search

38. LART: Compiled Abstract Execution : (Competition Contribution)

39. FuSeBMC v4: Smart Seed Generation for Hybrid Fuzzing : (Competition Contribution)

42. A Safe and Effective Tuning Technique for Similarity-Based Fuzzy Logic Programs

43. Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes

44. Pointer Program Synthesis as Non-deterministic Planning

45. Towards Verifying SHA256 in OpenSSL with the Software Analysis Workbench

46. FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)

47. BinSEAL: Linux Binary Obfuscation Against Symbolic Execution

48. Verifying Weakly Consistent Transactional Programs Using Symbolic Execution

Catalog

Books, media, physical & digital resources