Skip to main content
    • by 
    •   9  
      Computer ScienceSoftware EngineeringRelational DatabaseDatabase Systems
The present article analyses the relationship between the language of punishment and the public space in Dubrovnik from the Middle Ages until the beginning of the XIX century. It overviews justice sites and tries to understand their... more
    • by 
    •   9  
      Criminal Justice HistoryHistory of Urban CultureHISTORY OF CRIME AND LAWSymbolic Execution
    • by 
    •   8  
      Computer ScienceSymbolic ComputationFlow ControlSymbolic Execution
    • by 
    •   9  
      Computer ScienceMemoryDenotational SemanticsFormal Specification
    • by  and +1
    •   5  
      Software TestingSymbolic ExecutionExperimental EvaluationWeb Pages
    • by 
    •   8  
      Computer ArchitectureLogicComputational ModelingDigital Signal Processing
    • by 
    •   4  
      Symbolic ExecutionAutomatic code generationCode ObfuscationCondition dependence
Security analysts spend days or even weeks in trying to understand the inner workings of malicious software, using a plethora of manually orchestrated tools. Devising automated tools and techniques to assist and speed up the analysis... more
    • by 
    •   3  
      Reverse EngineeringMalware AnalysisSymbolic Execution
The text begins with the defining of the circus exhibitions performed on a vertical pole and with the historical track¬ing of these traditions in ancient cultures. Following this introduction, the author defines the representations of the... more
    • by 
    •   23  
      Mythology And FolkloreMythologyIconographyCosmology (Anthropology)
    • by 
    •   10  
      Static AnalysisSoftware EvolutionProgram AnalysisSensitivity Analysis
    • by 
    •   6  
      Liquid State MachineSymbolic ExecutionBehavior ModelingSimulation Model
The English public execution contained elements of both tragedy and the carnivalesque (or comic), yet scholars have debated on the significance and causation of these competing elements. This paper seeks unify the two by first explaining... more
    • by 
    •   9  
      Early Modern HistoryTudor EnglandEarly Modern EnglandEarly Modern Europe
    • by 
    •   5  
      Software EngineeringOpen SourceComplex SystemSymbolic Execution
    • by 
    •   9  
      PolymorphismFlow ControlQuantitative analysisOPERATING SYSTEM
    • by 
    •   17  
      Embedded SoftwareDigital CircuitsDistributed SystemOPERATING SYSTEM
    • by 
    •   9  
      Information SystemsSoftware ReliabilityComputer SoftwareFortran
    • by 
    •   3  
      Symbolic ExecutionTest Data GenerationAutomatic Assessment
    • by 
    •   2  
      Symbolic ExecutionIntermediate Representation
    • by 
    •   6  
      Data MiningAmorphous MaterialsReverse EngineeringProgram Slicing
    • by  and +2
    •   5  
      Information SystemsComputer SoftwareSymbolic ExecutionTest Data Generation
    • by 
    •   7  
      Model CheckingSoftware Model CheckingSymbolic ExecutionTest Case Generation
Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software vulnerabilities may need to rule out the... more
    • by 
    •   5  
      Software SecuritySoftware TestingSymbolic ExecutionSMT Solvers
    • by 
    •   7  
      PrivacyData AnalysisDynamic AnalysisReactive Power
    • by  and +1
    •   9  
      Computer ScienceSoftware EngineeringProgramming LanguagesSoftware Testing
In previous work, we introduced zero-overhead profiling (ZOP), a technique that leverages the electromagnetic emissions generated by the computer hardware to profile a program without instrumenting it. Although effective, ZOP has several... more
    • by  and +1
    •   2  
      Symbolic ExecutionSide-Channel Analysis
    • by 
    •   7  
      Model CheckingProgram AnalysisSymbolic ExecutionConstraint Solving
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may... more
    • by 
    •   3  
      Software TestingSymbolic ExecutionMemory Models
    • by 
    •   10  
      Software IndustrySpecification TestsAction LanguageSymbolic Execution
    • by 
    •   7  
      Web DevelopmentBug Finding TechniquesAutomated Software EngineeringSymbolic Execution
In the field of security software, the Common Criteria (CC) constitute an ISO standard for the evaluation of products and systems from Information Technologies. The international recognition of the Common Criteria justifies the investment... more
    • by 
    •   9  
      Information TechnologyFormal methodSymbolic ExecutionReference model
    • by 
    •   7  
      DatabasesHeuristic SearchHTMLSymbolic Execution
    • by 
    •   8  
      Fault ToleranceFault InjectionSymbolic ExecutionFormal Verification
This article presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input, EXE runs it on symbolic input initially allowed to be... more
    • by 
    •   7  
      Dynamic AnalysisSymbolic ExecutionConstraint SolvingTest Case Generation
    • by 
    •   9  
      Software TestingSymbolic Data AnalysisSymbolic ExecutionUnit Testing
    • by 
    •   17  
      Computer ScienceParallel ComputingObject Oriented ProgrammingData Mining
    • by 
    • Symbolic Execution
    • by 
    •   11  
      Software EngineeringData StructureAutomated Software EngineeringSymbolic Execution
    • by 
    •   10  
      Information SystemsModel-Based TestingComputer SoftwareCase Study
    • by 
    •   10  
      Information SystemsModel-Based TestingComputer SoftwareCase Study
    • by 
    •   6  
      Embedded SoftwareFormal methodSymbolic ExecutionSoftware Requirements
Interpolation has been successfully applied in formal meth- ods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct... more
    • by 
    •   3  
      Formal Methods (Formal Verification)Information SecuritySymbolic Execution
    • by  and +1
    •   10  
      Computer ScienceSoftware EngineeringRelational DatabaseDatabase Systems
Page 1. AUTOMATIC CONSTRUCTION OF TEST SETS: THEORETICAL APPROACH Andrejs Auzi0.{, J~nis B~rzdi0.{, J~.nis Bi6evskis, K~rlis Cer~.ns, Audris Kalni0~, The University of Latvia Rai0a bulv. 19, Rfga 226250, Latvia Abstract ...
    • by  and +2
    •   2  
      Symbolic ExecutionTest Generation
Conditioned slicing can be applied to reverse engineering problems which involve the extraction of executable fragments of code in the context of some criteria of interest. This paper introduces ConSUS, a conditioner for the Wide Spectrum... more
    • by 
    •   7  
      Data MiningAmorphous MaterialsReverse EngineeringProgram Slicing
    • by 
    •   17  
      LanguagesStatic AnalysisAbstract InterpretationProof Theory
    • by 
    •   4  
      Symbolic ExecutionProgram verificationCondition dependenceComputer
    • by 
    •   13  
      Graph TheorySoftware TestingFault DetectionModel validation
    • by 
    •   7  
      Software MaintenanceFault DetectionSoftware QualitySymbolic Execution
    • by 
    •   9  
      Software TestingSymbolic Data AnalysisSymbolic ExecutionUnit Testing