Symbolic execution optimization method based on input constraint
To solve path explosion,low rate of new path’s finding in the software testing,a new vulnerability discovering architecture based on input constraint symbolic execution (ICBSE) was proposed.ICBSE analyzed program source code to extract three types of constraints automatically.ICBSE then used these i...
Saved in:
Main Authors: | Sunlyu WANG, Yuqi LIN, Qiusong YANG, Mingshu LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019062/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01) -
Program state optimal method based on variable symbolic relation analysis
by: Xi GUO, et al.
Published: (2018-06-01) -
Security protocol code analysis method combining model learning and symbolic execution
by: Xieli ZHANG, et al.
Published: (2021-10-01) -
Symbolic execution based control flow graph extraction method for Android native codes
by: Hui-ying YAN, et al.
Published: (2017-07-01) -
Review of path branch obfuscation
by: Pu GENG, et al.
Published: (2020-04-01)