Abstract | ||
---|---|---|
Motivation The security of software is increasingly more critical for consumer confidence, protection of privacy, protection of intellectual property, and even national security. As threats to software security have become more sophisticated, so too have the techniques developed to ensure security. One basic technique that has become a fundamental tool in static security analysis is symbolic execution. There are now a number of successful approaches that rely on symbolic methods to reduce security questions about programs to constraint satisfaction problems in some formal logic (e.g., [4, 5, 7, 16]). Those problems are then solved automatically by specialized reasoners for the target logic. The found solutions are then used to construct automatically security exploits in the original programs or, more generally, identify security vulnerabilities. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1145/2898375.2898393 | HotSoS |
Keywords | Field | DocType |
String solving,SMT,autoiated security analysis | Security convergence,Security testing,Security through obscurity,Computer science,Software security assurance,Computer security,Security service,Cloud computing security,Security information and event management,Computer security model | Conference |
Citations | PageRank | References |
1 | 0.35 | 17 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Clark Barrett | 1 | 1268 | 108.65 |
Cesare Tinelli | 2 | 1409 | 79.86 |
Morgan Deters | 3 | 283 | 17.25 |
Tianyi Liang | 4 | 58 | 2.70 |
Andrew Reynolds | 5 | 57 | 4.96 |
Nestan Tsiskaridze | 6 | 41 | 3.55 |