DOVE: pinpointing firmware security vulnerabilities via symbolic control flow assertion mining (work-in-progress).
Alessandro DaneseGraziano PravadelliValeria BertaccoPublished in: CODES+ISSS (2017)
Keyphrases
- control flow
- security vulnerabilities
- data flow
- process model
- data mining
- software testing
- intrusion detection
- operating system
- modeling language
- workflow management systems
- penetration testing
- dos attacks
- knowledge discovery
- power consumption
- security properties
- formal semantics
- database
- data mining techniques
- information systems
- real world
- databases