Security protocol code analysis method combining model learning and symbolic execution

Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of securit...

Full description

Saved in:
Bibliographic Details
Main Authors: Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021067
Tags: Add Tag
No Tags, Be the first to tag this record!