0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017): Tevfik Bultan, Muath Alkhalaf, Fang Yu,... String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017)
Tevfik Bultan, Muath Alkhalaf, Fang Yu, Abdulbaki Aydin
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

String Analysis for Software Verification and Security (Paperback, Softcover reprint of the original 1st ed. 2017): Tevfik... String Analysis for Software Verification and Security (Paperback, Softcover reprint of the original 1st ed. 2017)
Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin
R1,829 Discovery Miles 18 290 Ships in 10 - 15 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

Automated Technology for Verification and Analysis - 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14,... Automated Technology for Verification and Analysis - 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011, Proceedings (Paperback)
Tevfik Bultan, Pao-Ann Hsiung
R1,541 Discovery Miles 15 410 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis, ATVA 2011, held in Taipei, Taiwan, in October 2011.
The 23 revised regular papers presented together with 5 invited papers, 11 short papers, and 2 tool papers, were carefully reviewed and selected from 75 submissions. The papers address all theoretical and practical aspects of automated analysis, verification and synthesis; thus providing a forum for interaction between the regional and the international research communities and industry in the field.

Web Services and Formal Methods - 7th International  Workshop, WS-FM 2010, Hoboken, NJ, USA, September 16-17, 2010. Revised... Web Services and Formal Methods - 7th International Workshop, WS-FM 2010, Hoboken, NJ, USA, September 16-17, 2010. Revised Selected Papers (Paperback, 2011 ed.)
Mario Bravetti, Tevfik Bultan
R1,441 Discovery Miles 14 410 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Web Services and Formal Methods, WS-FM 2010, held in Hoboken, NJ, USA, in September 2010. The 11 revised full papers presented together with one invited paper were carefully reviewed and selected from 26 submissions. The papers feature topics such as web services; service oriented computing; cloud computing; formal methods; verification specification; testing; and business process management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn Paperback  (5)
R199 R145 Discovery Miles 1 450
Raz Tech Laptop Security Chain Cable…
R299 R169 Discovery Miles 1 690
Dog Man: The Scarlet Shedder
Dav Pilkey Hardcover R420 R328 Discovery Miles 3 280
Efekto 77300-P Nitrile Gloves (L)(Pink)
R63 Discovery Miles 630
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Soudal Adhesive Fix All High Tack Super…
R239 Discovery Miles 2 390
Bostik Glu Dots - Extra Strength (64…
R55 R48 Discovery Miles 480
Dog's Life Ballistic Nylon Waterproof…
R999 R569 Discovery Miles 5 690
Conforming Bandage
R3 Discovery Miles 30

 

Partners