2017
DOI: 10.1007/978-3-319-68670-7
|View full text |Cite
|
Sign up to set email alerts
|

String Analysis for Software Verification and Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(27 citation statements)
references
References 0 publications
0
27
0
Order By: Relevance
“…Consider the split segmentation abstract predicate m = ([0, 0] 'a' [2,5], ∅) where C is the constant propagation domain for characters and B the interval domain. m approximates character arrays certainly containing a string of interest which is actually a sequence of 'a', whose length goes from 2 to 5, followed by a null character, e.g., "aa\0" and "aaaaa\0".…”
Section: Example 10mentioning
confidence: 99%
See 3 more Smart Citations
“…Consider the split segmentation abstract predicate m = ([0, 0] 'a' [2,5], ∅) where C is the constant propagation domain for characters and B the interval domain. m approximates character arrays certainly containing a string of interest which is actually a sequence of 'a', whose length goes from 2 to 5, followed by a null character, e.g., "aa\0" and "aaaaa\0".…”
Section: Example 10mentioning
confidence: 99%
“…In doing so, we will take advantage of the auxiliary function minlen which computes the minimum length of an element m ∈ M, as the upper bound of a split segmentation is possibly followed by a question mark. 2 2 ] such that b denotes the immediately preceding adapted segment bound. On the other hand, m 1 .ns is the result of removing from m 1 .ns the sub-segmentation that goes from the lower bound of m 1 .ns to the upper bound of m 1 .s included.…”
Section: Abstract Semanticsmentioning
confidence: 99%
See 2 more Smart Citations
“…For timing side channels, many analysis and verification techniques [6,9,10,25,45,46,53,62] have been developed, including the one proposed by Chen et al [11], which uses Cartesian Hoare Logic [51] to prove that timing leaks of a program are bounded. Antonopoulos et al [5] also developed a method for proving the absence of timing channels.…”
Section: Related Workmentioning
confidence: 99%