<--- Back to Details
First PageDocument Content
Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing
Date: 2017-04-30 18:44:12
Software engineering
Computer programming
Computing
Object-oriented programming languages
KeY
Symbolic execution
Thread
LLVM
Parallel computing
D
Concolic testing

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 514,41 KB

Share Document on Facebook

Similar Documents

Concolic Testing for Deep Neural Networks

Concolic Testing for Deep Neural Networks

DocID: 1xUoO - View Document

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution

DocID: 1reeX - View Document

Online Testing of Federated and Heterogeneous Distributed Systems Marco Canini, Vojin Jovanovi´c, Daniele Venzano, Dejan Novakovi´c, and Dejan Kosti´c School of Computer and Communication Sciences, EPFL, Switzerland {

Online Testing of Federated and Heterogeneous Distributed Systems Marco Canini, Vojin Jovanovi´c, Daniele Venzano, Dejan Novakovi´c, and Dejan Kosti´c School of Computer and Communication Sciences, EPFL, Switzerland {

DocID: 1qGjU - View Document

Unleashing Mayhem on Binary Code

Unleashing Mayhem on Binary Code

DocID: 1qxMt - View Document

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

DocID: 1q1wA - View Document