Condysta: Context-aware dynamic supplement to static taint analysis

X Zhang, X Wang, R Slavin, J Niu - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Static taint analyses are widely-applied techniques to detect taint flows in software systems.
Although they are theoretically conservative and de-signed to detect all possible taint flows …

Automated safety verification of programs invoking neural networks

M Christakis, HF Eniser, H Hermanns… - … Aided Verification: 33rd …, 2021 - Springer
State-of-the-art program-analysis techniques are not yet able to effectively verify safety
properties of heterogeneous systems, that is, systems with components implemented using …

[PDF][PDF] CoVEGI: Cooperative verification via externally generated invariants

J Haltermann, H Wehrheim - International Conference on …, 2021 - library.oapen.org
Software verification has recently made enormous progress due to the development of novel
verification methods and the speed-up of supporting technologies like SMT solving. To keep …

Hybrid security assessment methodology for web applications

R Correa, JR Bermejo Higuera… - … in Engineering & …, 2021 - ingentaconnect.com
This study presents a methodology to evaluate and prevent security vulnerabilities issues for
web applications. The analysis process is based on the use of techniques and tools that …

[PDF][PDF] Dy-COPECA: A Dynamic Version of MC/DC Analyzer for C Program.

S Godboley, A Dutta - ENASE, 2021 - academia.edu
RTCA/DO-178B&C standards mandate Modified Condition/Decision Coverage (MC/DC)
criterion for level-A category software. In critical safety system applications such as Aircraft or …

Detecting, characterizing, and taming flaky tests

W Lam - 2021 - ideals.illinois.edu
As software evolves, developers typically perform regression testing to ensure that their
code changes do not break existing functionalities. During regression testing, developers …

Finding Bugs with Specification-Based Testing is Easy!

J Chin, D Pearce - arXiv preprint arXiv:2103.00032, 2021 - arxiv.org
Automated specification-based testing has a long history with several notable tools having
emerged. For example, QuickCheck for Haskell focuses on testing against user-provided …

Forced Execution for Security Analysis of Software Without Source Code

F Peng - 2021 - search.proquest.com
Binary code analysis is widely used in many applications, including reverse engineering,
software forensics and security. It is very critical in these applications, since the analysis of …

Blended security analysis for web applications: Techniques and tools

PJC Nunes - 2021 - search.proquest.com
With the advent of the Internet and Information Society, the popularity of web applications is
increasing, resulting in rapid information growth and a clear impact on security aspects. In …

Cautiously Optimistic Program Analyses for Secure and Reliable Software

S Banerjee - 2021 - deepblue.lib.umich.edu
Modern computer systems still have various security and reliability vulnerabilities. Well-
known dynamic analyses solutions can mitigate them using runtime monitors that serve as …