0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

String Analysis for Software Verification and Security (Paperback, Softcover reprint of the original 1st ed. 2017) Loot Price: R1,890
Discovery Miles 18 900
String Analysis for Software Verification and Security (Paperback, Softcover reprint of the original 1st ed. 2017): Tevfik...

String Analysis for Software Verification and Security (Paperback, Softcover reprint of the original 1st ed. 2017)

Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin

 (sign in to rate)
Loot Price R1,890 Discovery Miles 18 900 | Repayment Terms: R177 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

General

Imprint: Springer International Publishing AG
Country of origin: Switzerland
Release date: June 2019
First published: 2017
Authors: Tevfik Bultan • Fang Yu • Muath Alkhalaf • Abdulbaki Aydin
Dimensions: 235 x 155mm (L x W)
Format: Paperback
Pages: 174
Edition: Softcover reprint of the original 1st ed. 2017
ISBN-13: 978-3-319-88637-4
Categories: Books > Computing & IT > Computer programming > Software engineering
Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 3-319-88637-1
Barcode: 9783319886374

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,724 Discovery Miles 67 240
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,432 Discovery Miles 64 320
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,410 Discovery Miles 84 100
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,432 Discovery Miles 64 320

See more

Partners