Browsing Theoretical Computer Science Group by Subject "symbolic execution"
Now showing items 1-3 of 3
-
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks
(ACM, 2014)We present a novel method for Quantitative Information Flow analysis. We show how the problem of computing information leakage can be viewed as an extension of the Satisfiability Modulo Theories (SMT) problem. This view ... -
Quantifying Information Leaks Using Reliability Analysis
(ACM, 2014)We report on our work-in-progress into the use of reliability analysis to quantify information leaks. In recent work we have proposed a software reliability analysis technique that uses symbolic execution and model counting ... -
Self-composition by Symbolic Execution
(Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2013)Self-composition is a logical formulation of non-interference, a high-level security property that guarantees the absence of illicit information leakages through executing programs. In order to capture program executions, ...