Sciweavers

481 search results - page 5 / 97
» Differential symbolic execution
Sort
View
IEICET
2010
92views more  IEICET 2010»
14 years 5 months ago
Multiple-Symbol Differential Detection for Unitary Space-Time-Frequency Coding
Ziyan Jia, Shiro Handa, Fumihito Sasamori, Shinjir...
FASE
2011
Springer
14 years 1 months ago
Theoretical Aspects of Compositional Symbolic Execution
Given a program and an assertion in that program, determining if the assertion can fail is one of the key applications of program analysis. Symbolic execution is a well-known techn...
Dries Vanoverberghe, Frank Piessens
CAV
2010
Springer
197views Hardware» more  CAV 2010»
15 years 1 months ago
Abstract Analysis of Symbolic Executions
Analysis of Symbolic Executions Aws Albarghouthi1 , Arie Gurfinkel2 , Ou Wei1,3 , and Marsha Chechik1 1 Department of Computer Science, University of Toronto, Canada 2 Software Eng...
Aws Albarghouthi, Arie Gurfinkel, Ou Wei, Marsha C...
BPM
2010
Springer
126views Business» more  BPM 2010»
14 years 8 months ago
Symbolic Execution of Acyclic Workflow Graphs
Abstract. We propose a new technique to analyze the control-flow, i.e., the workflow graph of a business process model, which we call symbolic execution. We consider acyclic workfl...
Cédric Favre, Hagen Völzer
ESORICS
2011
Springer
13 years 9 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao