0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017): Tevfik Bultan, Muath Alkhalaf, Fang Yu,... String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017)
Tevfik Bultan, Muath Alkhalaf, Fang Yu, Abdulbaki Aydin
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

String Analysis for Software Verification and Security (Paperback, Softcover reprint of the original 1st ed. 2017): Tevfik... String Analysis for Software Verification and Security (Paperback, Softcover reprint of the original 1st ed. 2017)
Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The SimCalc Vision and Contributions…
Stephen J Hegedus, Jeremy Roschelle Hardcover R4,899 Discovery Miles 48 990
Privatization and Foreign Investments in…
Iliana Zloch-Christy Hardcover R1,817 Discovery Miles 18 170
Algebraic K-theory of Crystallographic…
Daniel Scott Farley, Ivonne Johanna Ortiz Paperback R1,556 Discovery Miles 15 560
Privatization and Restructuring of…
Daniel Czamanski Hardcover R2,042 Discovery Miles 20 420
An Introduction to Differential Geometry…
Philippe G. Ciarlet Hardcover R2,763 Discovery Miles 27 630
Frontiers in Number Theory, Physics, and…
Pierre E. Cartier, Bernard Julia, … Hardcover R4,360 Discovery Miles 43 600
General Galois Geometries
James Hirschfeld, Joseph A. Thas Hardcover R3,530 R2,346 Discovery Miles 23 460
Future Vision and Trends on Shapes…
Raffaele De Amicis, Giuseppe Conti Hardcover R3,794 R3,264 Discovery Miles 32 640
Configurations from a Graphical…
Tomaz Pisanski, Brigitte Servatius Hardcover R2,441 R1,946 Discovery Miles 19 460
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,321 R1,228 Discovery Miles 12 280

 

Partners