Divide and conquer based symbolic vulnerability detection

dc.contributor.authorScherb, Christopher
dc.contributor.authorHeitz, Luc
dc.contributor.authorGrieder, Hermann
dc.date.accessioned2025-10-24T07:17:01Z
dc.date.issued2025-09-26
dc.description.abstractIn modern software development, vulnerability detection is crucial due to the inevitability of bugs and vulnerabilities in complex software systems. Effective detection and elimination of these vulnerabilities during the testing phase are essential. Current methods, such as fuzzing, are widely used for this purpose. While fuzzing is efficient in identifying a broad range of bugs and vulnerabilities by using random mutations or generations, it does not guarantee correctness or absence of vulnerabilities. Therefore, non-random methods are preferable for ensuring the safety and security of critical infrastructure and control systems. This paper presents a vulnerability detection approach based on symbolic execution and control flow graph analysis to identify various types of software weaknesses. Our approach employs a divide-and-conquer algorithm to eliminate irrelevant program information, thus accelerating the process and enabling the analysis of larger programs compared to traditional symbolic execution and model checking methods.
dc.identifier.doihttps://doi.org/10.48550/arXiv.2409.13478
dc.identifier.urihttps://irf.fhnw.ch/handle/11654/53207
dc.identifier.urihttps://doi.org/10.26041/fhnw-13919
dc.language.isoen
dc.publisherarxiv
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.spatialIthaca
dc.subject.ddc004 - Computer Wissenschaften, Internet
dc.subject.ddc005 - Computer Programmierung, Programme und Daten
dc.titleDivide and conquer based symbolic vulnerability detection
dc.type05 - Forschungs- oder Arbeitsbericht
dspace.entity.typePublication
fhnw.InventedHereYes
fhnw.ReviewTypeNo peer review
fhnw.affiliation.hochschuleHochschule für Informatik FHNWde_CH
fhnw.affiliation.institutInstitut für Mobile und Verteilte Systemede_CH
fhnw.publicationStatePublished
relation.isAuthorOfPublication0a902382-d63d-4b27-89aa-10313a428808
relation.isAuthorOfPublication2f439b50-2890-452e-b36b-899a9de8da36
relation.isAuthorOfPublication36d78936-76e7-4a1d-b303-8c0210f08986
relation.isAuthorOfPublication.latestForDiscovery0a902382-d63d-4b27-89aa-10313a428808
Dateien

Originalbündel

Gerade angezeigt 1 - 1 von 1
Lade...
Vorschaubild
Name:
Divide and Conquer based Symbolic Vulnerability Detection.pdf
Größe:
1.03 MB
Format:
Adobe Portable Document Format

Lizenzbündel

Gerade angezeigt 1 - 1 von 1
Lade...
Vorschaubild
Name:
license.txt
Größe:
2.66 KB
Format:
Item-specific license agreed upon to submission
Beschreibung: