Concolic testing is a popular method based on symbolic execution and constraint solving, designed for security testing of applications. Unfortunately, the current effectiveness of concolic testing tools are limited wh...
详细信息
ISBN:
(纸本)9781450324694
Concolic testing is a popular method based on symbolic execution and constraint solving, designed for security testing of applications. Unfortunately, the current effectiveness of concolic testing tools are limited when testing large applications due to the enormous number of control paths and limited budget. In this paper, we introduce selective symbolic execution, path selecting, random and incorrect seed input, three approaches to ease the path explosion and speed up bugs exploration. We also develop Crashmaker, a dynamic symbolic execution tool based on Valgrind and constraints solver STP, implementing our three improvement measures. To check the effectiveness and efficiency of Crashmaker, we make experiments with 7 different real-life programs, and compare with Avalanche. The evaluation results show that Crashmaker can effectively find more bugs in a more efficient way. Copyright 2014 ACM.
Usability is of significant importance for any interactive software. In the mobile domain, applications face more challenges to deliver good experiences to end users due to the characteristics and usage of mobile devi...
详细信息
XACML has become increasingly popular for specifying access control policies in mission critical domains to protect sensitive resources. However, manually crafted XACML policies may contain errors which can only be id...
详细信息
According to the website security and judicial forensics demands, a new Website Intrusion Forensics Model is proposed foe research. The model can discovery the website intrusion and forensic in time. This paper first ...
详细信息
On the problem of data quantity in anomaly detection, traditional dendritic cell algorithms should be improved by proposing an antigen data preprocessing method which introduced suspected abnormal base. The abnormal d...
详细信息
Most existing routing algorithms assume wireless nodes use maximal transmission power or set up the power at the beginning of the network configuration. These static approaches potentially introduce signal interferenc...
详细信息
ISBN:
(纸本)9781479984077
Most existing routing algorithms assume wireless nodes use maximal transmission power or set up the power at the beginning of the network configuration. These static approaches potentially introduce signal interference that can be mitigated through power control. In this paper, we propose a Joint Channel assignment, stable Routing and adaptive Power control (JCRP) approach that dynamically controls the transmission power to avoid the channel interference for improving the channel utility. Our JCRP allows a node to control its transmission power to a certain value at which it has a longest channel conflict-free time. Besides, we propose a novel routing metric integrated selecting stability (ISS) to measure the quality of links, which considers node mobility and channel interference, together with the dynamical power control. The simulation results demonstrate that our JCRP significantly outperforms the related routing algorithms in terms of network throughput.
Mobile devices are gradually taking over traditional computers' dominance in human lives. With the ever-increasing shipment of mobile apps running on these devices, their quality issues become a severe challenge. ...
详细信息
Most patch-based texture synthesis algorithms using Markov Random Field for composite materials only considers color similarity between the corresponding pixels. The traditional algorithms are lack of adaptability, so...
详细信息
Artificial bee colony (ABC) algorithm is a novel heuristic algorithm inspired from the intelligent behavior of honey bee swarm. ABC algorithm has a good performance on solving optimization problems of multivariable fu...
详细信息
Binary obfuscation is widely employed by malware distributors against malware analysis and detection. Mimimorphism is a novel technique arising from this arms race and technically opens a new line of obfuscation. It a...
详细信息
暂无评论