Input data generation for reaching specific function in program by iterative dynamic analysis
Dynamic symbolic execution is a well-known technique used for different tasks of program analysis: input generation for increasing test coverage for program, inputs of death generation, exploit generation and etc. But huge time costs of program analysis during dynamic symbolic execution for any real...
| Published in: | Труды Института системного программирования РАН |
|---|---|
| Main Authors: | A. Y. Gerasimov, L. V. Kruglov |
| Format: | Article |
| Language: | English |
| Published: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
2018-10-01
|
| Subjects: | |
| Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/176 |
Similar Items
An approach of reachability determination for static analysis defects with help of dynamic symbolic execution
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
Survey on static program analysis results refinement approaches
by: A. Y. Gerasimov
Published: (2018-10-01)
by: A. Y. Gerasimov
Published: (2018-10-01)
Dynamic program analysis for error detection using goal-seeking input data generation
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Methods and software tools for combined binary code analysis
by: V. A. Padaryan, et al.
Published: (2018-10-01)
by: V. A. Padaryan, et al.
Published: (2018-10-01)
On Some Limitations of Information Flow Tracking in Full-system Emulators
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
Interprocedural taint analysis for LLVM-bitcode
by: V. K. Koshelev, et al.
Published: (2018-10-01)
by: V. K. Koshelev, et al.
Published: (2018-10-01)
Vulnerabilities Detection via Static Taint Analysis
by: Nikita Vladimirovitch Chimtchik, et al.
Published: (2019-09-01)
by: Nikita Vladimirovitch Chimtchik, et al.
Published: (2019-09-01)
Using static analysis for finding security vulnerabilities and critical errors in source code
by: Arutyun Avetisyan, et al.
Published: (2018-10-01)
by: Arutyun Avetisyan, et al.
Published: (2018-10-01)
Applying dynamic analysis to programs running in interpreted environments
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Static analyzer Svace for finding of defects in program source code
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
Applying iterative dynamic analysis to programs with graphical user interface
by: M. K. Ermakov, et al.
Published: (2018-10-01)
by: M. K. Ermakov, et al.
Published: (2018-10-01)
Next generation intermediate representations for binary code analysis
by: M. A. Solovev, et al.
Published: (2019-02-01)
by: M. A. Solovev, et al.
Published: (2019-02-01)
Using unreachable code analysis in static analysis tool for finding defects in source code
by: R. R. Mulyukov, et al.
Published: (2018-10-01)
by: R. R. Mulyukov, et al.
Published: (2018-10-01)
Static detection of error of double locking of mutex
by: Alexey Borodin
Published: (2018-10-01)
by: Alexey Borodin
Published: (2018-10-01)
Avalanche: Using dynamic analysis for automatic defect detection in programs based on network sockets
by: Ildar Isaev, et al.
Published: (2018-10-01)
by: Ildar Isaev, et al.
Published: (2018-10-01)
Dynamic analysis of programs with graphical user interface based on symbolic execution
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Type inference for Python programming language
by: I. E. Bronshteyn
Published: (2018-10-01)
by: I. E. Bronshteyn
Published: (2018-10-01)
Approach to detecting types inconsistency errors in a program code in dynamic languages
by: I. E. Bronshteyn
Published: (2018-10-01)
by: I. E. Bronshteyn
Published: (2018-10-01)
Two-step Harmonious Melody Generator
by: Sofya Latkina
Published: (2018-10-01)
by: Sofya Latkina
Published: (2018-10-01)
Dynamic detection of Use After Free bugs
by: S. A. Asryan, et al.
Published: (2018-10-01)
by: S. A. Asryan, et al.
Published: (2018-10-01)
Applying Java bytecode static instrumentation for software dynamic analysis
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Platform for interprocedural static analysis of binary code
by: H. K. Aslanyan
Published: (2018-12-01)
by: H. K. Aslanyan
Published: (2018-12-01)
Recovery of binary data structures from program traces
by: A. I. Avetisyan, et al.
Published: (2018-10-01)
by: A. I. Avetisyan, et al.
Published: (2018-10-01)
Buffer Overflow Detection via Static Analysis: Expectations vs. Reality
by: I. A. Dudina
Published: (2018-10-01)
by: I. A. Dudina
Published: (2018-10-01)
An approach to the C string analysis for buffer overflow detection
by: I. A. Dudina, et al.
Published: (2018-12-01)
by: I. A. Dudina, et al.
Published: (2018-12-01)
Analysis of program changes nature and searching for unpatched code fragments
by: Mariam Seropovna Arutunian, et al.
Published: (2019-04-01)
by: Mariam Seropovna Arutunian, et al.
Published: (2019-04-01)
Supporting Java programming in the Svace static analyzer
by: A. P. Merkulov, et al.
Published: (2018-10-01)
by: A. P. Merkulov, et al.
Published: (2018-10-01)
Using different views java-programs for static analysis
by: E. A. Karpulevitch
Published: (2018-10-01)
by: E. A. Karpulevitch
Published: (2018-10-01)
Detecting race conditions in Java programs using dynamic analysis
by: M. . Ermakov, et al.
Published: (2018-10-01)
by: M. . Ermakov, et al.
Published: (2018-10-01)
Format recovery
by: A. I. Getman, et al.
Published: (2018-10-01)
by: A. I. Getman, et al.
Published: (2018-10-01)
Mechanisms for extending the system of static analysis Svace by new types of detectors of vulnerabilities and critical errors
by: Arutyun Avetisyan, et al.
Published: (2018-10-01)
by: Arutyun Avetisyan, et al.
Published: (2018-10-01)
Generation of the weakest preconditions of programs with dynamic memory in symbolic execution
by: A. V. Misonizhnik, et al.
Published: (2024-12-01)
by: A. V. Misonizhnik, et al.
Published: (2024-12-01)
Power saving code optimization based on using the power controllable components of CPU
by: I. I. Karetin, et al.
Published: (2018-10-01)
by: I. I. Karetin, et al.
Published: (2018-10-01)
Avalanche: adaptation of parallel and distributed computing for dynamic analysis to improve performance of defect detection
by: M. K. Ermakov, et al.
Published: (2018-10-01)
by: M. K. Ermakov, et al.
Published: (2018-10-01)
Dynamic Java program analysis using virtual machine modification
by: M. . Ermakov, et al.
Published: (2018-10-01)
by: M. . Ermakov, et al.
Published: (2018-10-01)
Исследование уровня социально-экономического развития регионов Российской Федерации методами многомерного анализа данных
by: Алексей Юрьевич Юдинцев, et al.
Published: (2023-03-01)
by: Алексей Юрьевич Юдинцев, et al.
Published: (2023-03-01)
Raising the level of abstraction of program execution trace
by: A. G. Nazarov, et al.
Published: (2018-10-01)
by: A. G. Nazarov, et al.
Published: (2018-10-01)
Dynamic analysis of virtualization- and dispatching-obfuscated applications
by: M. G. Bakulin, et al.
Published: (2018-10-01)
by: M. G. Bakulin, et al.
Published: (2018-10-01)
A Model Checking-Based Method of Functional Test Generation for HDL Descriptions
by: M. S. Lebedev, et al.
Published: (2018-10-01)
by: M. S. Lebedev, et al.
Published: (2018-10-01)
Automatic concurrency defect detection for Android applications
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
Similar Items
-
An approach of reachability determination for static analysis defects with help of dynamic symbolic execution
by: A. Y. Gerasimov, et al.
Published: (2018-10-01) -
Survey on static program analysis results refinement approaches
by: A. Y. Gerasimov
Published: (2018-10-01) -
Dynamic program analysis for error detection using goal-seeking input data generation
by: S. P. Vartanov, et al.
Published: (2018-10-01) -
Methods and software tools for combined binary code analysis
by: V. A. Padaryan, et al.
Published: (2018-10-01) -
On Some Limitations of Information Flow Tracking in Full-system Emulators
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
