Artículos relacionados a String Analysis for Software Verification and Security

String Analysis for Software Verification and Security - Tapa blanda

 
9783319886374: String Analysis for Software Verification and Security

Sinopsis

This is the first existing book focusing on string analysis

Discusses how string analysis techniques work and how they can be applied to vulnerability detection in modern software applications

This book can be used as a textbook for a course on string analysis, or as a supplementary book for a course on vulnerability detection

"Sinopsis" puede pertenecer a otra edición de este libro.

  • EditorialSpringer
  • Año de publicación2019
  • ISBN 10 3319886371
  • ISBN 13 9783319886374
  • EncuadernaciónTapa blanda
  • IdiomaInglés
  • Número de páginas184
  • Contacto del fabricanteno disponible

Comprar nuevo

Ver este artículo

EUR 11,00 gastos de envío desde Alemania a España

Destinos, gastos y plazos de envío

Otras ediciones populares con el mismo título

9783319686684: String Analysis for Software Verification and Security

Edición Destacada

ISBN 10:  3319686682 ISBN 13:  9783319686684
Editorial: Springer, 2018
Tapa dura

Resultados de la búsqueda para String Analysis for Software Verification and Security

Imagen del vendedor

Tevfik Bultan
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo Taschenbuch
Impresión bajo demanda

Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book discusses automated string-analysis techniques, focusing particularly on automata-basedstatic string analysis. It covers the following topics: automata-basesstring analysis, computing pre and post-conditions of basic stringoperations using automata, symbolic representation of automata, forwardand backward string analysis using symbolic automata representation,constraint-based string analysis, string constraint solvers, relational stringanalysis, vulnerability detection using string analysis, string abstractions,differential string analysis, and automated sanitization synthesis usingstring analysis. String manipulation is a crucial part of modern software systems; forexample, it is used extensively in input validation and sanitization and indynamic code and query generation. The goal of string-analysis techniques and this bookis to determine the set of values that string expressions can take duringprogram execution. String analysis can be used to solve many problems inmodern software systems that relate to string manipulation, such as: (1)Identifying security vulnerabilities by checking if a security sensitivefunction can receive an input string that contains an exploit; (2) Identifyingpossible behaviors of a program by identifying possible values fordynamically generated code; (3) Identifying html generation errors bycomputing the html code generated by web applications; (4) Identifyingthe set of queries that are sent to back-end database by analyzing the codethat generates the SQL queries; (5) Patching input validation andsanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the stringanalysis problem precisely (i.e., it is not possible to precisely determine theset of string values that can reach a program point). However, one cancompute over- or under-approximations of possible string values. If theapproximations are precise enough, they can enable developers todemonstrate existence or absence of bugs in string manipulating code.String analysis has been an active research area in the last decade,resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security,software verification, formal methods, software engineering and program analysis. Advancedlevel students or instructors teaching or studying courses in computer security, software verification or program analysis willfind this book useful as a secondary text. 184 pp. Englisch. Nº de ref. del artículo: 9783319886374

Contactar al vendedor

Comprar nuevo

EUR 64,19
Convertir moneda
Gastos de envío: EUR 11,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen del vendedor

Tevfik Bultan
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo Taschenbuch

Librería: AHA-BUCH GmbH, Einbeck, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book discusses automated string-analysis techniques, focusing particularly on automata-basedstatic string analysis. It covers the following topics: automata-basesstring analysis, computing pre and post-conditions of basic stringoperations using automata, symbolic representation of automata, forwardand backward string analysis using symbolic automata representation,constraint-based string analysis, string constraint solvers, relational stringanalysis, vulnerability detection using string analysis, string abstractions,differential string analysis, and automated sanitization synthesis usingstring analysis. String manipulation is a crucial part of modern software systems; forexample, it is used extensively in input validation and sanitization and indynamic code and query generation. The goal of string-analysis techniques and this bookis to determine the set of values that string expressions can take duringprogram execution. String analysis can be used to solve many problems inmodern software systems that relate to string manipulation, such as: (1)Identifying security vulnerabilities by checking if a security sensitivefunction can receive an input string that contains an exploit; (2) Identifyingpossible behaviors of a program by identifying possible values fordynamically generated code; (3) Identifying html generation errors bycomputing the html code generated by web applications; (4) Identifyingthe set of queries that are sent to back-end database by analyzing the codethat generates the SQL queries; (5) Patching input validation andsanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the stringanalysis problem precisely (i.e., it is not possible to precisely determine theset of string values that can reach aprogram point). However, one cancompute over- or under-approximations of possible string values. If theapproximations are precise enough, they can enable developers todemonstrate existence or absence of bugs in string manipulating code.String analysis has been an active research area in the last decade,resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security,software verification, formal methods, software engineering and program analysis. Advancedlevel students or instructors teaching or studying courses in computer security, software verification or program analysis willfind this book useful as a secondary text. Nº de ref. del artículo: 9783319886374

Contactar al vendedor

Comprar nuevo

EUR 64,19
Convertir moneda
Gastos de envío: EUR 11,99
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Bultan, Tevfik; Yu, Fang; Alkhalaf, Muath; Aydin, Abdulbaki
Publicado por Springer, 2019
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo Tapa blanda

Librería: Ria Christie Collections, Uxbridge, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. In. Nº de ref. del artículo: ria9783319886374_new

Contactar al vendedor

Comprar nuevo

EUR 74,13
Convertir moneda
Gastos de envío: EUR 4,68
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen del vendedor

Tevfik Bultan|Fang Yu|Muath Alkhalaf|Abdulbaki Aydin
Publicado por Springer International Publishing, 2019
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo Tapa blanda
Impresión bajo demanda

Librería: moluna, Greven, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This is the first existing book focusing on string analysis Discusses how string analysis techniques work and how&nbspthey can be applied to vulnerability detection in modern software&nbspapplicationsThis book can be used as a textbook f. Nº de ref. del artículo: 294884509

Contactar al vendedor

Comprar nuevo

EUR 61,55
Convertir moneda
Gastos de envío: EUR 19,49
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen de archivo

Bultan, Tevfik
Publicado por Springer 2019-06, 2019
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo PF

Librería: Chiron Media, Wallingford, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

PF. Condición: New. Nº de ref. del artículo: 6666-IUK-9783319886374

Contactar al vendedor

Comprar nuevo

EUR 66,82
Convertir moneda
Gastos de envío: EUR 17,62
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 10 disponibles

Añadir al carrito

Imagen del vendedor

Tevfik Bultan
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo Taschenbuch

Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. Neuware -This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis.String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book.Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach aprogram point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques.This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 184 pp. Englisch. Nº de ref. del artículo: 9783319886374

Contactar al vendedor

Comprar nuevo

EUR 69,54
Convertir moneda
Gastos de envío: EUR 35,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Bultan, Tevfik/ Yu, Fang/ Alkhalaf, Muath/ Aydin, Abdulbaki
Publicado por Springer-Verlag New York Inc, 2019
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo Paperback

Librería: Revaluation Books, Exeter, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Brand New. reprint edition. 184 pages. 9.25x6.10x0.47 inches. In Stock. Nº de ref. del artículo: x-3319886371

Contactar al vendedor

Comprar nuevo

EUR 97,40
Convertir moneda
Gastos de envío: EUR 11,76
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Bultan, Tevfik; Yu, Fang; Alkhalaf, Muath; Aydin, Abdulbaki
Publicado por Springer, 2019
ISBN 10: 3319886371 ISBN 13: 9783319886374
Nuevo Tapa blanda

Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. Nº de ref. del artículo: ABLIING23Mar3113020111350

Contactar al vendedor

Comprar nuevo

EUR 66,59
Convertir moneda
Gastos de envío: EUR 64,93
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito