Zobrazeno 1 - 7
of 7
pro vyhledávání: '"William Eiers"'
Publikováno v:
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering.
Publikováno v:
Proceedings of the 44th International Conference on Software Engineering.
Autor:
Timo Kehrer, Ji Wang, Minxing Tang, Pavel Parizek, Elena Sherman, Eric Mercer, Peter Aldous, Zhenbang Chen, Ismet Burak Kadron, Koushik Sen, Tevfik Bultan, Yannic Noller, Hoang Lam Nguyen, Cyrille Artho, Benjamin M. Ogles, Kyle Storey, Joshua Hooker, Lucas Bang, Egor Namakonov, Alyas Almaawi, Hengbiao Yu, Lars Grunske, Corina S. Păsăreanu, Seemanta Saha, S. Jacob Powell, Willem Visser, William Eiers, Sarfraz Khurshid, David Lo, Quoc-Sang Phan, Xuan-Bach D. Le, Wei Dong, Rohan Padhye, Simon Goldsmith, Hayes Converse, Lasse Berglund, Sasa Misailovic, Milos Gligoric
Publikováno v:
ACM SIGSOFT Software Engineering Notes. 45:20-22
Java Path nder (JPF) was originally developed as an explicit- state software model checker, and subsequently evolved into an extensible Java bytecode analysis framework that has been suc- cessfully used to implement techniques such as symbolic and co
Publikováno v:
ASE
Quantitative program analysis is an emerging area with applications to software reliability, quantitative information flow, side-channel detection and attack synthesis. Most quantitative program analysis techniques rely on model counting constraint s
Information leaks are a significant problem in modern computer systems and string manipulation is prevalent in modern software. We present techniques for automated synthesis of side-channel attacks that recover secret string values based on timing ob
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::edae85b9bf5e578f818d3f6513d123c9
http://arxiv.org/abs/1907.11710
http://arxiv.org/abs/1907.11710
Autor:
Tevfik Bultan, William Eiers, Fang Yu, Tegan Brennan, Abdulbaki Aydin, Lucas Bang, Miroslav Gavrilov
Publikováno v:
ESEC/SIGSOFT FSE
Recently, symbolic program analysis techniques have been extended to quantitative analyses using model counting constraint solvers. Given a constraint and a bound, a model counting constraint solver computes the number of solutions for the constraint
Publikováno v:
ACM SIGSOFT Software Engineering Notes. 44:16-16
Information leakage is a signi cant problem in modern software systems. Information leaks due to side channels are especially hard to detect and analyze. In recent years, techniques have been developed for automated synthesis of adaptive side-channel