메뉴 건너뛰기




Volumn 6806 LNCS, Issue , 2011, Pages 1-19

HAMPI: A string solver for testing, analysis and vulnerability detection

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED TESTING; BUG FINDING; C PROGRAMS; CONSTRAINT SOLVERS; CONSTRAINT SOLVING; EXPERIMENTAL DATA; INPUT CONSTRAINTS; PROGRAM ANALYSIS; REGULAR EXPRESSIONS; SEPARATION OF CONCERNS; SOURCE CODES; SQL INJECTION; STATIC AND DYNAMIC ANALYSIS; SUBSTRING; SYSTEMATIC TESTING; VERIFICATION TECHNIQUES; VULNERABILITY DETECTION; WEB APPLICATION;

EID: 79960350209     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22110-1_1     Document Type: Conference Paper
Times cited : (32)

References (25)
  • 2
    • 70350490611 scopus 로고    scopus 로고
    • Path feasibility analysis for string-manipulating programs
    • Kowalewski, S., Philippou, A. (eds.) TACAS 2009. Springer, Heidelberg
    • Bjørner, N., Tillmann, N., Voronkov, A.: Path feasibility analysis for string-manipulating programs. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 307-321. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5505 , pp. 307-321
    • Bjørner, N.1    Tillmann, N.2    Voronkov, A.3
  • 3
    • 67650790221 scopus 로고    scopus 로고
    • Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • USENIX Association, San Diego
    • Cadar, C., Dunbar, D., Engler, D.R.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Symposium on Operating Systems Design and Implementation. USENIX Association, San Diego (2008)
    • (2008) Symposium on Operating Systems Design and Implementation
    • Cadar, C.1    Dunbar, D.2    Engler, D.R.3
  • 5
    • 45749085681 scopus 로고    scopus 로고
    • Z3: An Efficient SMT Solver
    • Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. Springer, Heidelberg
    • de Moura, L., Bjørner, N.S.: Z3: An Efficient SMT Solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337-340. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4963 , pp. 337-340
    • De Moura, L.1    Bjørner, N.S.2
  • 8
    • 38149088089 scopus 로고    scopus 로고
    • A decision procedure for bit-vectors and arrays
    • Damm, W., Hermanns, H. (eds.) CAV 2007. Springer, Heidelberg
    • Ganesh, V., Dill, D.L.: A decision procedure for bit-vectors and arrays. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 519-531. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4590 , pp. 519-531
    • Ganesh, V.1    Dill, D.L.2
  • 13
    • 40449091840 scopus 로고    scopus 로고
    • WASP: Protecting Web applications using positive tainting and syntax-aware evaluation
    • Halfond, W., Orso, A., Manolios, P.: WASP: Protecting Web applications using positive tainting and syntax-aware evaluation. Transactions on Software Engineering 34(1), 65-81 (2008)
    • (2008) Transactions on Software Engineering , vol.34 , Issue.1 , pp. 65-81
    • Halfond, W.1    Orso, A.2    Manolios, P.3
  • 18
  • 22
    • 67651005111 scopus 로고    scopus 로고
    • Introduction to the Theory of Computation
    • Florence, KY
    • Sipser, M.: Introduction to the Theory of Computation. In: Course Technology, Florence, KY (2005)
    • (2005) Course Technology
    • Sipser, M.1
  • 23
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of Web applications for injection vulnerabilities
    • ACM, San Diego
    • Wassermann, G., Su, Z.: Sound and precise analysis of Web applications for injection vulnerabilities. In: Programming Language Design and Implementation. ACM, San Diego (2007)
    • (2007) Programming Language Design and Implementation
    • Wassermann, G.1    Su, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.