For this reason, several techniques have been recently proposed to support designer in proving programs differentially private or in finding violations to it. In this work we propose a technique based on symbolic execution for reasoning about differential privacy. Symbolic execution is a classic ...
Systematic Testing for Control ApplicationsMemoCODE2010Rupak Majumdar, Indranil Saha, Zilong Wang Mixing type checking and symbolic executionPLDI2010Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Foster Program Analysis via Satisfiability Modulo Path ProgramsPOPL2010William R. Harris, Sriram Sankaranar...
Xie, Q., Atif, M.: Using a Pilot Study to Derive a GUI Model for Automated Testing. In: TOSEM (2008) Google Scholar Zhang, J., Xu, C., Wang, X.: Path-Oriented Test Data Generation Using Symbolic Execution and Constraint Solving Techniques. In: SEFM (2004) ...
it has three key control parameters:penaltysize,orderrandomandsampleShareinit. There are some other standard parameters like the maximum execution time, the maximum number of iterations, the pseudo-random number generator seed, etc. The first key parameter quantifies the importance of solution express...
expressed correctly; the symbolic execution fails to explore the stack buffer overflow vulnerability in the more complex cve-2004-1257_abc2mtex due to the path explosion problem. Therefore, it is difficult for BofAEG to detect stack buffer overflow vulnerabilities for CVE programs with high ...
We show that actually, considering timing attacks does not add any complexity: time trace equivalence can be reduced to length trace equivalence, where the attacker no longer has access to execution times but can still compare the length of messages. We therefore deduce from a previous decid...
Heap Cloning: Enabling Dynamic Symbolic Execution of Java Programs ASE 2011 Saswat Anand, Mary Jean Harrold S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems ASPLOS 2011 Vitaly Chipounov, Volodymyr Kuznetsov, George Candea LCT: An Open Source Concolic Testing Tool for Java Prog...
Earlier studies covered, methods for program analysis that combine the dynamic symbolic execution, randomized testing, and static analysis. In this paper, a formal model for detecting bugs using the symbolic execution of programs and its implementation for detecting the buffer bounds violation is ...
We build on two semantic frameworks for symbolic execution of probabilistic programs. For discrete programs, we use weakest pre-expectation calculus to compute exact symbolic expressions for the leakage measures. Using Second Order Gaussian Approximation (SOGA), we handle programs that combine discrete ...