In this paper, we consider checking the robustness of web services using the model of finite state automata and analyzing the solvability of an automaton equation over the concatenation operator. The paper contains th...
详细信息
Nowadays automated dynamic analysis frameworks for continuous testing are in high demand to ensure software safety and satisfy the security development lifecycle (SDL) requirements. The security bug hunting efficiency...
详细信息
Dynamic symbolic execution is a widely used technique for automated software testing, designed for execution paths exploration and program errors detection. A hybrid approach has recently become widespread, when the m...
详细信息
ISBN:
(纸本)9781665423281
Dynamic symbolic execution is a widely used technique for automated software testing, designed for execution paths exploration and program errors detection. A hybrid approach has recently become widespread, when the main goal of symbolic execution is helping fuzzer increase program coverage. The more branches symbolic executor can invert, the more useful it is for fuzzer. A program control flow often depends on memory values, which are obtained by computing address indexes from user input. However, most DSE tools don’t support such dependencies, so they miss some desired program *** implement symbolic addresses reasoning on memory reads in our dynamic symbolic execution tool Sydr. Possible memory access regions are determined by either analyzing memory address symbolic expressions, or binary searching with SMT-solver. We propose an enhanced linearization technique to model memory *** memory modeling methods are compared on the set of programs. Our evaluation shows that symbolic addresses handling allows to discover new symbolic branches and increase the program coverage.
This paper considers open-source tools for the logical-synthesis and place-and-route hardware design stages. Several flows (CADs), including qFlow, OpenLANE, Coriolis, VTR, and SymbiFlow, have been described. For expe...
详细信息
Dynamic symbolic execution is a widely used technique for automated software testing, designed for execution paths exploration and program errors detection. A hybrid approach has recently become widespread, when the m...
详细信息
The two-dimensional problem of a viscous laminar flow around Zhukovsky airfoils at an angle of attack is considered. Based on the approach of local similarity, which was proposed by Kochin and Loytsyansky for the equa...
详细信息
The two-dimensional problem of a viscous laminar flow around Zhukovsky airfoils at an angle of attack is considered. Based on the approach of local similarity, which was proposed by Kochin and Loytsyansky for the equations of laminar boundary layer, we have found the shear stresses at the aifoil, and the coordinates of the separation points. Assuming the values of the velocities at the separation points to be equal, we find the value of the circulation. A complete solution to the problem of the velocity and pressure field outside the boundary layer is also constructed. The theoretical results are compared with the available experimental data and numerical simulations of the Navier-Stokes equations.
A recent trend in multimodal retrieval is related to postprocessing test set results via the dual-softmax loss (DSL). While this approach can bring significant improvements, it usually presumes that an entire matrix o...
详细信息
The paper investigates the implementation of virtual networks on the SDN data plane, modeled by a graph of physical connections between network nodes. A virtual network is defined as a set of ordered host pairs (sende...
详细信息
Most of the state-of-the-art verifiers do not scale well on complicated software. Concurrency benchmarks from SV-COMP based on Linux device drivers cause significant difficulties for any software model checker tool. W...
详细信息
The main difference between container-based and virtualization-based cloud environments is the way of the virtualization methods for OS and auxiliary resources. Software applications can be both deployed in a cloud on...
详细信息
暂无评论