Abstract. Concolic testing is widely regarded as the state-of-the-art technique in dynamic discovering and analyzing trigger-based behavior in software programs. It uses symbolic execution and an automatic the-orem prover to generate new concrete test cases to maximize code cover-age for scenarios like software verification and malware analysis. While malicious developers usually try their best to hide malicious executions
International audienceCode obfuscation is emerging as a key asset in security by obscurity.It aims a...
Context: Neural Network (NN) algorithms have been successfully adopted in a number of Safety-Critica...
In the last few years, a large variety of approaches and methodologies have been explored in the con...
Concolic testing combines program execution and symbolic analysis to explore the execution paths of ...
Concolic testing alternates between CONCrete program execution and symbOLIC analysis to explore the ...
This paper presents an approach to estimate the potency of obfuscation techniques. Our approach uses...
Concolic testing is a technique that combines concrete and symbolic execution in order to generate i...
Symbolic and concolic execution find important applications in a number of security-related program ...
Associated research group: Critical Systems Research GroupTesting cyber-physical systems presents a ...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Testing using manually generated test cases is the primary technique used in industry to improve rel...
Testing using manually generated test cases is the primary technique used in industry to improve rel...
International audienceCode obfuscation is emerging as a key asset in security by obscurity.It aims a...
Context: Neural Network (NN) algorithms have been successfully adopted in a number of Safety-Critica...
In the last few years, a large variety of approaches and methodologies have been explored in the con...
Concolic testing combines program execution and symbolic analysis to explore the execution paths of ...
Concolic testing alternates between CONCrete program execution and symbOLIC analysis to explore the ...
This paper presents an approach to estimate the potency of obfuscation techniques. Our approach uses...
Concolic testing is a technique that combines concrete and symbolic execution in order to generate i...
Symbolic and concolic execution find important applications in a number of security-related program ...
Associated research group: Critical Systems Research GroupTesting cyber-physical systems presents a ...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Testing using manually generated test cases is the primary technique used in industry to improve rel...
Testing using manually generated test cases is the primary technique used in industry to improve rel...
International audienceCode obfuscation is emerging as a key asset in security by obscurity.It aims a...
Context: Neural Network (NN) algorithms have been successfully adopted in a number of Safety-Critica...
In the last few years, a large variety of approaches and methodologies have been explored in the con...