Modern software systems require the support of automatic program analyses to answer questions about their correctness, reliability, and safety. In recent years, symbolic execution techniques have played a pivotal role in this field, backing research in different domains such as software testing and software security. Like other powerful machine analyses, symbolic execution is often affected by efficiency and scalability issues that can be mitigated when a domain expert interacts with its working, steering the computation to achieve the desired goals faster. In this paper we explore how visual analytics techniques can help the user to grasp properties of the ongoing analysis and use such insights to refine the symbolic exploration process. T...
Malicious applications are usually comprehended through two major techniques, namely static and dyna...
In recent years, the use of symbolic analysis in systems for testing and verifying programs has exp...
University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant...
Modern software systems require the support of automatic program analyses to answer questions about ...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
Many security and software testing applications require checking whether certain properties of a pro...
Today, malware threats are more dangerous than ever with thousand of new samples emerging everyday. ...
Security analysts spend days or even weeks in trying to understand the inner workings of malicious s...
Symbolic execution is a powerful technique for exploring programs and generating inputs that drive t...
Over the past 20 years, our society has become increasingly dependent on software. Today, we rely on...
Symbolic execution is widely used to detect vulnerabilities in software. The idea is to symbolically...
Malware infections have grown at least five-fold in the past five years. With an increase in IoT dev...
Security analysts spend days or even weeks in trying to understand the inner workings of malicious s...
Quantitative program analysis is an emerging area with applications to software testing and security...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Malicious applications are usually comprehended through two major techniques, namely static and dyna...
In recent years, the use of symbolic analysis in systems for testing and verifying programs has exp...
University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant...
Modern software systems require the support of automatic program analyses to answer questions about ...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
Many security and software testing applications require checking whether certain properties of a pro...
Today, malware threats are more dangerous than ever with thousand of new samples emerging everyday. ...
Security analysts spend days or even weeks in trying to understand the inner workings of malicious s...
Symbolic execution is a powerful technique for exploring programs and generating inputs that drive t...
Over the past 20 years, our society has become increasingly dependent on software. Today, we rely on...
Symbolic execution is widely used to detect vulnerabilities in software. The idea is to symbolically...
Malware infections have grown at least five-fold in the past five years. With an increase in IoT dev...
Security analysts spend days or even weeks in trying to understand the inner workings of malicious s...
Quantitative program analysis is an emerging area with applications to software testing and security...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Malicious applications are usually comprehended through two major techniques, namely static and dyna...
In recent years, the use of symbolic analysis in systems for testing and verifying programs has exp...
University of Minnesota Ph.D. dissertation. 2021. Major: Computer Science. Advisor: Stephen McCamant...