HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Moritz EckertAntonio BianchiRuoyu WangYan ShoshitaishviliChristopher KruegelGiovanni VignaPublished in: USENIX Security Symposium (2018)
Keyphrases
- bounded model checking
- model checking
- data structure
- information security
- general purpose
- intrusion detection
- access control
- key management
- cooperative
- security requirements
- smart card
- linear temporal logic
- formal verification
- statistical databases
- temporal logic
- reinforcement learning
- domain specific
- multi agent systems
- search algorithm