Search

Your search keyword '"symbolic execution"' showing total 3,984 results

Search Constraints

Start Over You searched for: Descriptor "symbolic execution" Remove constraint Descriptor: "symbolic execution"
3,984 results on '"symbolic execution"'

Search Results

1. Ethchecker: a context-guided fuzzing for smart contracts.

2. SAEG: Stateful Automatic Exploit Generation

3. ATIU: An Automated Method for Testing Embedded C/C++ Projects Containing Incomplete Units

4. Hevm, a Fast Symbolic Execution Framework for EVM Bytecode

5. Verification Algorithms for Automated Separation Logic Verifiers

6. On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr

8. KLEEF: Symbolic Execution Engine (Competition Contribution)

12. DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining

13. Symbolic Path-Guided Test Cases for Models with Data and Time

15. Detecting Privileged Parties on Ethereum

16. Comparison between Performance of Constraint Solver for Prediction Model in Symbolic Execution

17. Automatic Test Value Generation for Ada.

18. Schematic Program Proofs with Abstract Execution.

19. An Empirical Study on Automated Test Generation Tools for Java: Effectiveness and Challenges.

20. Adaptive solving strategy synthesis for symbolic execution.

21. Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities.

22. ShadowBug: Enhanced Synthetic Fuzzing Benchmark Generation

23. AFL++: A Vulnerability Discovery and Reproduction Framework.

24. Binary Program Vulnerability Mining Based on Neural Network.

25. Uncovering Hidden Dependencies: Constructing Intelligible Path Witnesses using Dataflow Analyses.

27. AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree.

28. A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes.

29. Denotational Semantics for Symbolic Execution

30. Guiding Symbolic Execution with A-Star

31. Towards Efficient Data-Flow Test Data Generation

32. Computer-Aided Reverse Engineering of Protected Software

33. Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation

34. Automated Synthesis of Software Contracts with KindSpec

35. Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis

36. Adversarial Reachability for Program-level Security Analysis

37. Equivalence Checking of Code Transformation by Numerical and Symbolic Approaches

38. symQV: Automated Symbolic Verification of Quantum Programs

40. Fuzzing of Embedded Systems: A Survey.

41. sem2vec: Semantics-aware Assembly Tracelet Embedding.

42. Checking cryptographic API specifications in JavaScript

43. Towards rigorous understanding of neural networks via semantics-preserving transformations.

44. Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure.

45. 符号执行技术及应用研究综述.

46. Malware Analysis with Symbolic Execution and Graph Kernel

49. A Guided Search for Races Based on Data Flow Patterns

Catalog

Books, media, physical & digital resources