Matches in SemOpenAlex for { <https://semopenalex.org/work/W4226287003> ?p ?o ?g. }
Showing items 1 to 84 of
84
with 100 items per page.
- W4226287003 endingPage "254" @default.
- W4226287003 startingPage "245" @default.
- W4226287003 abstract "The importance of information security dramatically increased and will further grow due to the shape and nature of the modern computing industry. Software is published at a continuously increasing pace. The Internet of Things and security protocols are two examples of domains that pose a great security challenge, due to how diverse the needs for those software may be, and a generalisation of the capabilities regarding the toolchain necessary for testing is becoming a necessity. Oftentimes, these software are designed starting from a formal model, which can be verified with appropriate model checkers. These models, though, do not represent the actual implementation, which can deviate from the model and hence certain security properties might not be inherited from the model, or additional issues could be introduced in the implementation. In this paper we describe a proposal for a novel technique to assess software security properties from LLVM bitcode. We perform various static analyses, such as points-to analysis, call graph and control-flow graph, with the aim of deriving from them an ‘accurate enough’ formal model of the paths taken by the program, which are then going to be examined via consolidated techniques by matching them against a set of defined rules. The proposed workflow then requires further analysis with more precise methods if a rule is violated, in order to assess the actual feasibility of such path(s). This step is required as the analyses performed to derive the model to analyse are over-approximating the behaviour of the software." @default.
- W4226287003 created "2022-05-05" @default.
- W4226287003 creator A5016526188 @default.
- W4226287003 creator A5054881469 @default.
- W4226287003 date "2022-01-01" @default.
- W4226287003 modified "2023-10-02" @default.
- W4226287003 title "Reasoning About Inter-procedural Security Requirements in IoT Applications" @default.
- W4226287003 cites W116894366 @default.
- W4226287003 cites W1970005004 @default.
- W4226287003 cites W2511015845 @default.
- W4226287003 cites W2514974017 @default.
- W4226287003 cites W2574017551 @default.
- W4226287003 cites W2594518290 @default.
- W4226287003 cites W3047442547 @default.
- W4226287003 cites W4206770190 @default.
- W4226287003 cites W4239035626 @default.
- W4226287003 cites W4252745200 @default.
- W4226287003 doi "https://doi.org/10.1007/978-3-030-99619-2_24" @default.
- W4226287003 hasPublicationYear "2022" @default.
- W4226287003 type Work @default.
- W4226287003 citedByCount "0" @default.
- W4226287003 crossrefType "book-chapter" @default.
- W4226287003 hasAuthorship W4226287003A5016526188 @default.
- W4226287003 hasAuthorship W4226287003A5054881469 @default.
- W4226287003 hasBestOaLocation W42262870032 @default.
- W4226287003 hasConcept C103377522 @default.
- W4226287003 hasConcept C110251889 @default.
- W4226287003 hasConcept C111919701 @default.
- W4226287003 hasConcept C115903868 @default.
- W4226287003 hasConcept C121822524 @default.
- W4226287003 hasConcept C177212765 @default.
- W4226287003 hasConcept C177264268 @default.
- W4226287003 hasConcept C184842701 @default.
- W4226287003 hasConcept C195518309 @default.
- W4226287003 hasConcept C199360897 @default.
- W4226287003 hasConcept C2777062904 @default.
- W4226287003 hasConcept C2777904410 @default.
- W4226287003 hasConcept C29983905 @default.
- W4226287003 hasConcept C38652104 @default.
- W4226287003 hasConcept C41008148 @default.
- W4226287003 hasConcept C527648132 @default.
- W4226287003 hasConcept C62913178 @default.
- W4226287003 hasConcept C77088390 @default.
- W4226287003 hasConcept C79974875 @default.
- W4226287003 hasConcept C80444323 @default.
- W4226287003 hasConceptScore W4226287003C103377522 @default.
- W4226287003 hasConceptScore W4226287003C110251889 @default.
- W4226287003 hasConceptScore W4226287003C111919701 @default.
- W4226287003 hasConceptScore W4226287003C115903868 @default.
- W4226287003 hasConceptScore W4226287003C121822524 @default.
- W4226287003 hasConceptScore W4226287003C177212765 @default.
- W4226287003 hasConceptScore W4226287003C177264268 @default.
- W4226287003 hasConceptScore W4226287003C184842701 @default.
- W4226287003 hasConceptScore W4226287003C195518309 @default.
- W4226287003 hasConceptScore W4226287003C199360897 @default.
- W4226287003 hasConceptScore W4226287003C2777062904 @default.
- W4226287003 hasConceptScore W4226287003C2777904410 @default.
- W4226287003 hasConceptScore W4226287003C29983905 @default.
- W4226287003 hasConceptScore W4226287003C38652104 @default.
- W4226287003 hasConceptScore W4226287003C41008148 @default.
- W4226287003 hasConceptScore W4226287003C527648132 @default.
- W4226287003 hasConceptScore W4226287003C62913178 @default.
- W4226287003 hasConceptScore W4226287003C77088390 @default.
- W4226287003 hasConceptScore W4226287003C79974875 @default.
- W4226287003 hasConceptScore W4226287003C80444323 @default.
- W4226287003 hasLocation W42262870031 @default.
- W4226287003 hasLocation W42262870032 @default.
- W4226287003 hasOpenAccess W4226287003 @default.
- W4226287003 hasPrimaryLocation W42262870031 @default.
- W4226287003 hasRelatedWork W1410484705 @default.
- W4226287003 hasRelatedWork W2090657160 @default.
- W4226287003 hasRelatedWork W2102172945 @default.
- W4226287003 hasRelatedWork W2103800010 @default.
- W4226287003 hasRelatedWork W2120367855 @default.
- W4226287003 hasRelatedWork W2523677811 @default.
- W4226287003 hasRelatedWork W3015409264 @default.
- W4226287003 hasRelatedWork W3043532533 @default.
- W4226287003 hasRelatedWork W4226287003 @default.
- W4226287003 hasRelatedWork W4287815598 @default.
- W4226287003 isParatext "false" @default.
- W4226287003 isRetracted "false" @default.
- W4226287003 workType "book-chapter" @default.