We study the fundamental issue of decidability of satisfiability over string logics with concatenations and finite-state transducers as atomic operations. Although restricting to one type of operations yields decidability, little is known about the decidability of their combined theory, which is especially relevant when analysing security vulnerabilities of dynamic web pages in a more realistic browser model. On the one hand, word equations (string logic with concatenations) cannot precisely capture sanitisation functions (e.g. htmlescape) and implicit browser transductions (e.g. innerHTML mutations). On the other hand, transducers suffer from the reverse problem of being able to model sanitisation functions and browser transductions, but n...
Abstract. Most common vulnerabilities in Web applications are due to string manipulation errors in i...
Most common vulnerabilities in modern software applications are due to errors in string manipulatio...
We investigate properties of strings which are expressible by canonical types of string constraints....
We study the fundamental issue of decidability of satisfiability over string logics with concatenati...
Artículo de publicación ISIWe study the fundamental issue of decidability of satisfiability over str...
String analysis is the problem of reasoning about how strings are manipulated by a program. It has n...
The design and implementation of decision procedures for checking path feasibility in string-manipul...
The theory of strings with concatenation has been widely argued as the basis of constraint solving f...
Bugs in user input sanitation of software systems often lead to vulnerabilities. Among them many are...
Abstract. There has been significant interest in static analysis of pro-grams that manipulate string...
Abstract. We prove several decidability and undecidability results for the satisfiability and validi...
Motivated by the vulnerability analysis of web programs which work on string inputs, we present S3, ...
We introduce TranSeq, a non-deterministic, branching transition system for deciding the satisfiabil...
We prove several decidability and undecidability results for the satisfiability/validity problem of ...
This archive is provided as artifact material for the article "Decision Procedures for Sequence Theo...
Abstract. Most common vulnerabilities in Web applications are due to string manipulation errors in i...
Most common vulnerabilities in modern software applications are due to errors in string manipulatio...
We investigate properties of strings which are expressible by canonical types of string constraints....
We study the fundamental issue of decidability of satisfiability over string logics with concatenati...
Artículo de publicación ISIWe study the fundamental issue of decidability of satisfiability over str...
String analysis is the problem of reasoning about how strings are manipulated by a program. It has n...
The design and implementation of decision procedures for checking path feasibility in string-manipul...
The theory of strings with concatenation has been widely argued as the basis of constraint solving f...
Bugs in user input sanitation of software systems often lead to vulnerabilities. Among them many are...
Abstract. There has been significant interest in static analysis of pro-grams that manipulate string...
Abstract. We prove several decidability and undecidability results for the satisfiability and validi...
Motivated by the vulnerability analysis of web programs which work on string inputs, we present S3, ...
We introduce TranSeq, a non-deterministic, branching transition system for deciding the satisfiabil...
We prove several decidability and undecidability results for the satisfiability/validity problem of ...
This archive is provided as artifact material for the article "Decision Procedures for Sequence Theo...
Abstract. Most common vulnerabilities in Web applications are due to string manipulation errors in i...
Most common vulnerabilities in modern software applications are due to errors in string manipulatio...
We investigate properties of strings which are expressible by canonical types of string constraints....