Automata-based symbolic string analysis for vulnerability detection (Q2248096): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Efficient Symbolic Representations for Arithmetic Constraints in Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Path Feasibility Analysis for String-Manipulating Programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ambiguity in Graphs and Expressions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2754102 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical String Analyzer by the Widening Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4813388 / rank
 
Normal rank
Property / cites work
 
Property / cites work: MONA IMPLEMENTATION SECRETS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Translating regular expression matching into transducers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symbolic finite state transducers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symbolic Automata: The Toolkit / rank
 
Normal rank
Property / cites work
 
Property / cites work: RELATIONAL STRING VERIFICATION USING MULTI-TRACK AUTOMATA / rank
 
Normal rank

Latest revision as of 16:29, 8 July 2024

scientific article
Language Label Description Also known as
English
Automata-based symbolic string analysis for vulnerability detection
scientific article

    Statements

    Automata-based symbolic string analysis for vulnerability detection (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    30 June 2014
    0 references
    string analysis
    0 references
    automated verification
    0 references
    web application security
    0 references
    vulnerability analysis
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers