SMT-constrained symbolic execution engine for integer overflow detection in C code (English)
- New search for: Muntean, Paul
- New search for: Rahman, Mustafizur
- New search for: Ibing, Andreas
- New search for: Eckert, Claudia
- New search for: Muntean, Paul
- New search for: Rahman, Mustafizur
- New search for: Ibing, Andreas
- New search for: Eckert, Claudia
In:
2015 Information Security for South Africa (ISSA)
;
1-8
;
2015
- Conference paper / Electronic Resource
-
Title:SMT-constrained symbolic execution engine for integer overflow detection in C code
-
Contributors:Muntean, Paul ( author ) / Rahman, Mustafizur ( author ) / Ibing, Andreas ( author ) / Eckert, Claudia ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2015-08-01
-
Size:3198841 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Playing hide-and-seek: Detecting the manipulation of Android TimestampsPieterse, Heloise / Olivier, Martin S. / van Heerden, Renier P. et al. | 2015
- 1
-
The state of database forensic researchHauger, Werner K. / Olivier, Martin S. et al. | 2015
- 1
-
Review process| 2015
- 1
-
Risk-driven security metrics development for an e-health IoT applicationSavola, Reijo M. / Savolainen, Pekka / Evesti, Antti / Abie, Habtamu / Sihvonen, Markus et al. | 2015
- 1
-
A framework of opportunity-reducing techniques to mitigate the insider threatPadayachee, Keshnee et al. | 2015
- 1
-
The current state of digital forensic practitioners in South AfricaJordaan, Jason / Bradshaw, Karen et al. | 2015
- 1
-
Access control for local personal smart spacesGreaves, Brian / Coetzee, Marijke et al. | 2015
- 1
-
Characterization and analysis of NTP amplification based DDoS attacksRudman, L. / Irwin, B. et al. | 2015
- 1
-
Analyzing the security posture of South African websitesMtsweni, J. et al. | 2015
- 1
-
Mapping ‘Security Safeguard’ Requirements in a data privacy legislation to an international privacy framework: A compliance methodologyGovender, I. et al. | 2015
- 1
-
Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concernsvan der Merwe, Mc Donald / van Staden, Wynand JC et al. | 2015
- 1
-
A formal qualitative risk management approach for IT securityMahopo, Bessy / Abdullah, Hanifa / Mujinga, Mathias et al. | 2015
- 1
-
Location aware mobile device managementdu Toit, Jaco / Ellefsen, Ian et al. | 2015
- 1
-
Prerequisites for building a Computer Security Incident Response capabilityMooi, Roderick / Botha, Reinhardt A. et al. | 2015
- 1
-
State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?Watney, Murdoch et al. | 2015
- 1
-
Data aggregation using homomorphic encryption in wireless sensor networksRamotsoela, T.D. / Hancke, G.P. et al. | 2015
- 1
-
Robustness of computational intelligent assurance models when assessing e-Commerce sitesMayayise, Thembekile O. / Osunmakinde, Isaac O. et al. | 2015
- 1
-
Copyright page| 2015
- 1
-
Protection of Personal Information in the South African Cloud Computing environment: A framework for Cloud Computing adoptionSkolmen, Dayne Edward / Gerber, Mariana et al. | 2015
- 1
-
Cloud supply chain resilienceHerrera, Andrea / Janczewski, Lech et al. | 2015
- 1
-
IntroductionVenter, Hein / Loock, Marianne / Coetzee, Marijke / Eloff, Mariki et al. | 2015
- 1
-
Biometric identification: Are we ethically ready?Renaud, Karen / Hoskins, Andrew / von Solms, Rossouw et al. | 2015
- 1
-
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation processIngels, Melissa / Valjarevic, Aleksandar / Venter, Hein S. et al. | 2015
- 1
-
An investigation into credit card information disclosure through Point of Sale purchasesvon Solms, S. et al. | 2015
- 1
-
The adversarial threat posed by the NSA to the integrity of the internetNaude, Jared / Drevin, Lynette et al. | 2015
- 1
-
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysisWrench, Peter M. / Irwin, Barry V. W. et al. | 2015
- 1
-
A model for the design of next generation e-supply chain digital forensic readiness toolsMasvosvere, D.J.E. / Venter, H.S. et al. | 2015
- 1
-
AFA-RFID: Physical layer authentication for passive RFID tagsSmith, Gregory Stuart / Coetzee, Marijke et al. | 2015
- 1
-
Committees| 2015
- 1
-
Reviewers| 2015
- 1
-
Adding event reconstruction to a Cloud Forensic Readiness modelKebande, Victor R. / Venter, H.S. et al. | 2015
- 1
-
Beacons and their uses for digital forensics purposesLubbe, Luke / Oliver, Martin et al. | 2015
- 1
-
Towards a digital forensic scienceOlivier, Martin S et al. | 2015
- 1
-
Focus| 2015
- 1
-
Intrusion detection in Bluetooth enabled mobile phonesNair, Kishor Krishnan / Helberg, Albert / Van Der Merwe, Johan et al. | 2015
- 1
-
The effects of the PoPI Act on small and medium enterprises in South AfricaBotha, J.G. / Eloff, M.M. / Swart, I. et al. | 2015
- 1
-
SMT-constrained symbolic execution engine for integer overflow detection in C codeMuntean, Paul / Rahman, Mustafizur / Ibing, Andreas / Eckert, Claudia et al. | 2015
- 1
-
Self-sanitization of digital images using steganographyMorkel, Tayana et al. | 2015
- c1
-
Title page| 2015