Security protocol code analysis method combining model learning and symbolic execution
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of securit...
Saved in:
Main Authors: | Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021067 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01) -
Symbolic execution based control flow graph extraction method for Android native codes
by: Hui-ying YAN, et al.
Published: (2017-07-01) -
Symbolic execution optimization method based on input constraint
by: Sunlyu WANG, et al.
Published: (2019-03-01) -
Research on construction of conditional exception code used in branch obfuscation
by: Pu GENG, et al.
Published: (2020-12-01) -
Program state optimal method based on variable symbolic relation analysis
by: Xi GUO, et al.
Published: (2018-06-01)