String Analysis for Software Verification and Security
Tevfik Bultan
Venduto da AHA-BUCH GmbH, Einbeck, Germania
Venditore AbeBooks dal 14 agosto 2006
Nuovi - Rilegato
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloVenduto da AHA-BUCH GmbH, Einbeck, Germania
Venditore AbeBooks dal 14 agosto 2006
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloDruck auf Anfrage Neuware - Printed after ordering - This book discusses automated string-analysis techniques, focusing particularly on automata-basedstatic string analysis. It covers the following topics: automata-basesstring analysis, computing pre and post-conditions of basic stringoperations using automata, symbolic representation of automata, forwardand backward string analysis using symbolic automata representation,constraint-based string analysis, string constraint solvers, relational stringanalysis, vulnerability detection using string analysis, string abstractions,differential string analysis, and automated sanitization synthesis usingstring analysis. String manipulation is a crucial part of modern software systems; forexample, it is used extensively in input validation and sanitization and indynamic code and query generation. The goal of string-analysis techniques and this bookis to determine the set of values that string expressions can take duringprogram execution. String analysis can be used to solve many problems inmodern software systems that relate to string manipulation, such as: (1)Identifying security vulnerabilities by checking if a security sensitivefunction can receive an input string that contains an exploit; (2) Identifyingpossible behaviors of a program by identifying possible values fordynamically generated code; (3) Identifying html generation errors bycomputing the html code generated by web applications; (4) Identifyingthe set of queries that are sent to back-end database by analyzing the codethat generates the SQL queries; (5) Patching input validation andsanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the stringanalysis problem precisely (i.e., it is not possible to precisely determine theset of string values that can reach aprogram point). However, one cancompute over- or under-approximations of possible string values. If theapproximations are precise enough, they can enable developers todemonstrate existence or absence of bugs in string manipulating code.String analysis has been an active research area in the last decade,resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security,software verification, formal methods, software engineering and program analysis. Advancedlevel students or instructors teaching or studying courses in computer security, software verification or program analysis willfind this book useful as a secondary text.
Codice articolo 9783319686684
This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis.
String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book.
Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques.
This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Visita la pagina della libreria
Termini e condizioni generali e informazioni sul cliente / Informativa sulla privacy
I. Condizioni generali di contratto
§ 1 Disposizioni di base
(1) I seguenti termini e condizioni si applicano a tutti i contratti che l'utente conclude con noi in qualità di fornitore (AHA-BUCH GmbH) tramite le piattaforme Internet AbeBooks e/o ZVAB. Se non diversamente concordato, l'inclusione di uno qualsiasi dei tuoi termini e condizioni da te utilizzati sarà contestata.
(2) Un consumatore ai sensi delle segu...
Spediamo il tuo ordine dopo averlo ricevuto
per articoli a portata di mano entro 24 ore,
per articoli con fornitura notturna entro 48 ore.
Nel caso in cui abbiamo bisogno di ordinare un articolo dal nostro fornitore, il nostro tempo di spedizione dipende dalla data di ricezione degli articoli, ma gli articoli verranno spediti lo stesso giorno.
Il nostro obiettivo è quello di inviare gli articoli ordinati nel modo più veloce, ma anche più efficiente e sicuro ai nostri clienti.
Quantità dell?ordine | Da 2 a 3 giorni lavorativi | Da 2 a 3 giorni lavorativi |
---|---|---|
Primo articolo | EUR 14.99 | EUR 14.99 |
I tempi di consegna sono stabiliti dai venditori e variano in base al corriere e al paese. Gli ordini che devono attraversare una dogana possono subire ritardi e spetta agli acquirenti pagare eventuali tariffe o dazi associati. I venditori possono contattarti in merito ad addebiti aggiuntivi dovuti a eventuali maggiorazioni dei costi di spedizione dei tuoi articoli.