Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Aldughaim, Mohannad"'
Autor:
Menezes, Rafael Sá, Manino, Edoardo, Shmarov, Fedor, Aldughaim, Mohannad, de Freitas, Rosiane, Cordeiro, Lucas C.
Bounded Model Checking (BMC) is a widely used software verification technique. Despite its successes, the technique has several limiting factors, from state-space explosion to lack of completeness. Over the years, interval analysis has repeatedly bee
Externí odkaz:
http://arxiv.org/abs/2406.15281
Autor:
Alshmrany, Kaled M., Aldughaim, Mohannad, Wei, Chenfeng, Sweet, Tom, Allmendinger, Richard, Cordeiro, Lucas C.
We present FuSeBMC-AI, a test generation tool grounded in machine learning techniques. FuSeBMC-AI extracts various features from the program and employs support vector machine and neural network models to predict a hybrid approach optimal configurati
Externí odkaz:
http://arxiv.org/abs/2404.06031
Autor:
Menezes, Rafael, Aldughaim, Mohannad, Farias, Bruno, Li, Xianzhiyu, Manino, Edoardo, Shmarov, Fedor, Song, Kunjian, Brauße, Franz, Gadelha, Mikhail R., Tihanyi, Norbert, Korovin, Konstantin, Cordeiro, Lucas C.
ESBMC implements many state-of-the-art techniques for model checking. We report on new and improved features that allow us to obtain verification results for previously unsupported programs and properties. ESBMC employs a new static interval analysis
Externí odkaz:
http://arxiv.org/abs/2312.14746
Bounded model checking (BMC) and fuzzing techniques are among the most effective methods for detecting errors and security vulnerabilities in software. However, there are still shortcomings in detecting these errors due to the inability of existent m
Externí odkaz:
http://arxiv.org/abs/2206.14068
FuSeBMC is a test generator for finding security vulnerabilities in C programs. In earlier work [4], we described a previous version that incrementally injected labels to guide Bounded Model Checking (BMC) and Evolutionary Fuzzing engines to produce
Externí odkaz:
http://arxiv.org/abs/2112.10627
Bounded model checking (BMC) is vital for finding program property violations. For unsafe programs, BMC can quickly find an execution path from an initial state to the violated state that refutes a given safety property. However, BMC techniques strug
Externí odkaz:
http://arxiv.org/abs/2012.11245
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Fundamental Approaches to Software Engineering
Lecture Notes in Computer Science-Fundamental Approaches to Software Engineering
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=sygma_______::5eb14e5a051c882c8f6ca998c73acc7d