소프트웨어 안전성 검증을 위한 입력 파일 기반 동적 기호 실행 방법
Vol. 27, No. 4, pp. 811-820,
8월.
2017
10.13089/JKIISC.2017.27.4.811, Full Text:
Keywords: Dynamic Symbolic Execution, Vulnerability, Automatic Exploit Generation
Abstract Statistics
Cite this article
10.13089/JKIISC.2017.27.4.811, Full Text:
Keywords: Dynamic Symbolic Execution, Vulnerability, Automatic Exploit Generation
Abstract Statistics
Cite this article
[IEEE Style]
S. Park, S. Kang, H. Kim, B. Noh, "Input File Based Dynamic Symbolic Execution Method for Software Safety Verification," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 4, pp. 811-820, 2017. DOI: 10.13089/JKIISC.2017.27.4.811.
[ACM Style]
Sunghyun Park, Sangyong Kang, Hwisung Kim, and Bongnam Noh. 2017. Input File Based Dynamic Symbolic Execution Method for Software Safety Verification. Journal of The Korea Institute of Information Security and Cryptology, 27, 4, (2017), 811-820. DOI: 10.13089/JKIISC.2017.27.4.811.