Mining patterns of unsatisfiable constraints to detect infeasible paths
Detection of infeasible paths is required in many areas including test coverage analysis, test case generation, security vulnerability analysis, etc. Existing approaches typically use static analysis coupled with symbolic evaluation, heuristics, or path-pattern analysis. This paper is related to the...
Saved in:
Main Authors: | DING, Sun, TAN, Hee Beng Kuan, SHAR, Lwin Khin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4779 https://ink.library.smu.edu.sg/context/sis_research/article/5782/viewcontent/Mining_Patterns_of_Unsatisfiable_Constraints_to_Detect_Infeasible_Paths_AST15.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Efficient detection and exploitation of infeasible paths for software timing analysis
by: Suhendra, V., et al.
Published: (2013) -
Convergence Analysis of an Infeasible Interior Point Algorithm Based on a Regularized Central Path for Linear Complementarity Problems
by: Zhou, G., et al.
Published: (2014) -
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
by: SHAR, Lwin Khin, et al.
Published: (2013) -
Infeasible potential reduction algorithms for semidefinite programming
by: Zhao, X.-Y., et al.
Published: (2014) -
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
by: SHAR, Lwin Khin, et al.
Published: (2012)