咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 12 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 13 篇 symbolic executi...
  • 2 篇 vulnerability mi...
  • 2 篇 constraint solvi...
  • 2 篇 test generation
  • 1 篇 model checker
  • 1 篇 state explosion
  • 1 篇 mpi
  • 1 篇 klee
  • 1 篇 software model c...
  • 1 篇 compiler optimiz...
  • 1 篇 path explosion
  • 1 篇 program analysis
  • 1 篇 static metric
  • 1 篇 parallelizingsym...
  • 1 篇 abstraction
  • 1 篇 automatic repair
  • 1 篇 fuzzing testing
  • 1 篇 satisfiability p...
  • 1 篇 modified conditi...
  • 1 篇 constraint optim...

机构

  • 2 篇 department of co...
  • 2 篇 state key labora...
  • 1 篇 department of el...
  • 1 篇 college of compu...
  • 1 篇 school of cyber ...
  • 1 篇 department of co...
  • 1 篇 key laboratory o...
  • 1 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 department of co...
  • 1 篇 department of ad...
  • 1 篇 state key labora...
  • 1 篇 key laboratory o...
  • 1 篇 institute for ne...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 ieee
  • 1 篇 ccf
  • 1 篇 institute of inf...
  • 1 篇 acm

作者

  • 2 篇 ji wang
  • 1 篇 jinbo du
  • 1 篇 lin yu
  • 1 篇 lingappan logana...
  • 1 篇 yu wang
  • 1 篇 马晓星
  • 1 篇 wei dong
  • 1 篇 zetian mai
  • 1 篇 shuangping xing
  • 1 篇 baowen xu
  • 1 篇 pengzhi xu
  • 1 篇 fan zhou
  • 1 篇 jiong gong
  • 1 篇 hsiao michael s.
  • 1 篇 zhongxing xu
  • 1 篇 zhenbang chen
  • 1 篇 wei-jiang hong
  • 1 篇 krishnamoorthy s...
  • 1 篇 zhen guo
  • 1 篇 zhenhui li

语言

  • 12 篇 英文
  • 1 篇 中文
检索条件"主题词=Symbolic execution"
13 条 记 录,以下是1-10 订阅
排序:
Tuning parallel symbolic execution engine for better performance
收藏 引用
Frontiers of Computer Science 2018年 第1期12卷 86-100页
作者: Anil Kumar KARNA Jinbo DU Haihao SHEN Hao ZHONG Jiong GONG Haibo YU Xiangning MA: Jianjun ZHAO Department of Computer Science Shanghai Jiao Tong University Shanghai 200240 China School of Software Shanghai Jiao Tong University Shanghai 200240 China Intel Asia-Pacific Research and Development Ltd. Shanghai 200240 China Department of Advanced Information Technology Kyushu University Fukuoka 819-0395 Japan
symbolic execution is widely used in many code analysis, testing, and verification tools. As symbolic execu- tion exhaustively explores all feasible paths, it is quite time consuming. To handle the problem, researcher... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Strategies for scalable symbolic execution-driven test generation for programs
收藏 引用
Science China(Information Sciences) 2011年 第9期54卷 1797-1812页
作者: KRISHNAMOORTHY Saparya HSIAO Michael S. LINGAPPAN Loganathan Intel Corporation Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University
With the advent of advanced program analysis and constraint solving techniques,several test generation tools use variants of symbolic *** techniques have been shown to be very effective in path-based test generation;h... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Modified condition/decision coverage(MC/DC)oriented compiler optimization for symbolic execution
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2020年 第9期21卷 1267-1284页
作者: Wei-jiang HONG Yi-jun LIU Zhen-bang CHEN Wei DONG Ji WANG College of Computer National University of Defense TechnologyChangsha 410073China State Key Laboratory of High Performance Computing National University of Defense TechnologyChangsha 410073China
symbolic execution is an effective way of systematically exploring the search space of a program,and is often used for automatic software testing and bug *** program to be analyzed is usually compiled into a binary or... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Automatic Buffer Overflow Warning Validation
收藏 引用
Journal of Computer Science & Technology 2020年 第6期35卷 1406-1427页
作者: Feng-Juan Gao Yu Wang Lin-Zhang Wang Zijiang Yang Xuan-Dong Li State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China Department of Computer Science Western Michigan UniversityKalamazoo 49008-5466U.S.A.
Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warning... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An empirical study on constraint optimization techniques for test generation
收藏 引用
Science China(Information Sciences) 2017年 第1期60卷 69-83页
作者: Zhiyi ZHANG Zhenyu CHEN Ruizhi GAO Eric WONG Baowen XU State Key Laboratory for Novel Software Technology Nanjing University Department of Computer Science University of Texas at Dallas
Constraint solving is a frequent, but expensive operation with symbolic execution to generate tests for a program. To improve the efficiency of test generation using constraint solving, four optimization techniques ar... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Empirical Study on Automated Test Generation Tools for Java:Effectiveness and Challenges
收藏 引用
Journal of Computer Science & Technology 2024年 第3期39卷 715-736页
作者: 刘相君 余萍 马晓星 State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China CCF ACM IEEE
Automated test generation tools enable test automation and further alleviate the low efficiency caused by writing hand-crafted test ***,existing automated tools are not mature enough to be widely used by software test... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Evaluation of model checkers by verifying message passing programs
收藏 引用
Science China(Information Sciences) 2019年 第10期62卷 6-30页
作者: Weijiang HONG Zhenbang CHEN Hengbiao YU Ji WANG College of Computer National University of Defense Technology State Key Laboratory of High Performance Computing National University of Defense Technology
Benchmarks and evaluation are important for the development of techniques and tools. Studies regarding evaluation of model checkers by large-scale benchmarks are few. The lack of such studies is mainly because of the ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Melton: a practical and precise memory leak detection tool for C programs
收藏 引用
Frontiers of Computer Science 2015年 第1期9卷 34-54页
作者: Zhenbo XU Jian ZHANG Zhongxing XU Department of Computer Science and Technology University of Science and Technology of China Anhui 230027 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China
Memory leaks are a common type of defect that is hard to detect manually. Existing memory leak detection tools suffer from lack of precise interprocedural analysis and path-sensitivity. To address this problem, we pre... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Electrical and Computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
Software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
From proof-of-concept to exploitable
收藏 引用
Cybersecurity 2019年 第1期2卷 189-213页
作者: Yan Wang WeiWu Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou School of Cyber Security University of Chinese Academy of SciencesBeijingChina Institute for Network Sciences and Cyberspace Tsinghua UniversityBeijingChina College of Information Sciences and Technology Pennsylvania State UniversityUniversity ParkUnited States Institute of Information Engineering Chinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology CASBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina
Exploitability assessment of vulnerabilities is important for both defenders and *** ultimate way to assess the exploitability is crafting a working ***,it usually takes tremendous hours and significant manual *** add... 详细信息
来源: 维普期刊数据库 维普期刊数据库 维普期刊数据库 维普期刊数据库 评论