Essays about: "symbolic execution"

Showing result 1 - 5 of 26 essays containing the words symbolic execution.

  1. 1. Amplifying heap overflow vulnerability detection with reinforcement learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Erik Thomasson; Ludwig Wideskär; [2023]
    Keywords : ;

    Abstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE

  2. 2. Exposing memory accesses and branches in machine code to symbolic execution : Tracking instructions through binary raising

    University essay from Linköpings universitet/Programvara och system

    Author : Isak Axelsson; [2023]
    Keywords : Binary lifting; Binary raising; Spectre;

    Abstract : In 2018, a new security vulnerability was discovered that existed in billions of processors from different manufacturers, using various architectures. A so-called spectre attack can be launched to exploit the vulnerability and cause cryptographic information to leak through side-channels of the targeted system. READ MORE

  3. 3. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols

    University essay from Uppsala universitet/Datalogi

    Author : Sabor Amini; [2023]
    Keywords : Requirement-driven; Symbolic execution; Network protocols; CoAP; EDHOC; Kravbaserad; Symbolisk Exekvering; Nätverksprotokoll;

    Abstract : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. READ MORE

  4. 4. Extending applicability of symbolic execution to uncover possible shared memory transactions in GPU programs

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jonathan Hjort; [2022]
    Keywords : ;

    Abstract : General-purpose computing on the graphics processing unit has become popular since the cost-to-power ratio is lower for GPUs (compared to CPUs) and the programmability of the GPU has increased. CUDA is an extension of the C/C++ programming languages which enables software developers to more easily make use of the computational power of the GPUs. READ MORE

  5. 5. RAUK: Automatic Schedulability Analysis of RTIC Applications Using Symbolic Execution

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mark Håkansson; [2022]
    Keywords : RTIC; symbolic execution; embedded systems; software verification; software analysis; schedulability;

    Abstract : In this thesis, the proof-of-concept tool RAUK for automatically analyzing RTIC applications for schedulability using symbolic execution is presented. The RTIC framework provides a declarative executable model for building embedded applications, which behavior is based on established formal methods and policies. READ MORE