Cargando…

A model-guided symbolic execution approach for network protocol implementations and vulnerability detection

Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network prot...

Descripción completa

Detalles Bibliográficos
Autores principales: Wen, Shameng, Meng, Qingkun, Feng, Chao, Tang, Chaojing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5690638/
https://www.ncbi.nlm.nih.gov/pubmed/29145458
http://dx.doi.org/10.1371/journal.pone.0188229