Symbolic analysis for increased program execution performance

被引:0
|
作者
Psarris, Kleanthis [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:318 / 318
页数:1
相关论文
共 50 条
  • [41] Relational Symbolic Execution
    Farina, Gian Pietro
    Chong, Stephen
    Gaboardi, Marco
    [J]. PROCEEDINGS OF THE 21ST INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING (PPDP 2019), 2019,
  • [42] Symbolic Execution with CEGAR
    Beyer, Dirk
    Lemberger, Thomas
    [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: FOUNDATIONAL TECHNIQUES, PT I, 2016, 9952 : 195 - 211
  • [43] An analysis on secure coding using symbolic execution engine
    Kim, Joon-Ho
    Ma, Myung-Chul
    Park, Jae-Pyo
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (03): : 177 - 184
  • [44] Chopped Symbolic Execution
    Trabish, David
    Mattavelli, Andrea
    Rinetzky, Noam
    Cadar, Cristian
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 350 - 360
  • [45] Quantum symbolic execution
    Jiang Nan
    Wang Zichen
    Wang Jian
    [J]. Quantum Information Processing, 22
  • [46] Certified Symbolic Execution
    Qiu, Rui
    Pasareanu, Corina S.
    Khurshid, Sarfraz
    [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, ATVA 2016, 2016, 9938 : 495 - 511
  • [47] Intraprocedural Analysis Based on Symbolic Execution for Bug Detection
    Borodin, A. E.
    Dudina, I. A.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2021, 47 (08) : 858 - 865
  • [48] Analysis to Heap Overflow Exploit in Linux with Symbolic Execution
    Huang, Ning
    Huang, Shuguang
    Chang, Chao
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [49] Automated Analysis of Reo Circuits using Symbolic Execution
    Pourvatan, Bahman
    Sirjani, Marjan
    Hojjat, Hossein
    Arbab, Farhad
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 255 : 137 - 158
  • [50] Assisting Malware Analysis with Symbolic Execution: A Case Study
    Baldoni, Roberto
    Coppa, Emilio
    D'Elia, Daniele Cono
    Demetrescu, Camil
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 171 - 188