Cargando…
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection
Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network prot...
Autores principales: | Wen, Shameng, Meng, Qingkun, Feng, Chao, Tang, Chaojing |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5690638/ https://www.ncbi.nlm.nih.gov/pubmed/29145458 http://dx.doi.org/10.1371/journal.pone.0188229 |
Ejemplares similares
-
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering
por: Wen, Shameng, et al.
Publicado: (2017) -
Improving Symbolic Automata Learning with Concolic Execution
por: Clun, Donato, et al.
Publicado: (2020) -
Coupled Relational Symbolic Execution for Differential Privacy
por: Farina, Gian Pietro, et al.
Publicado: (2021) -
Symbiotic 8: Beyond Symbolic Execution: (Competition Contribution)
por: Chalupa, Marek, et al.
Publicado: (2021) -
On Implementing Symbolic Controllability
por: Francalanza, Adrian, et al.
Publicado: (2020)