Symbolic Execution and Quantitative Reasoning (Record no. 85183)

000 -LEADER
fixed length control field 03855nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-031-02551-8
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730164000.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220601s2020 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031025518
-- 978-3-031-02551-8
082 04 - CLASSIFICATION NUMBER
Call Number 620
100 1# - AUTHOR NAME
Author Păsăreanu, Corina S.
245 10 - TITLE STATEMENT
Title Symbolic Execution and Quantitative Reasoning
Sub Title Applications to Software Safety and Security /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages IX, 65 p.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Software Engineering,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Acknowledgments -- Introduction -- Symbolic Execution: The Basics -- Symbolic Complexity Analysis -- Probabilistic Reasoning -- Side-Channel Analysis -- Conclusion and Directions for the Future -- Bibliography -- Author's Biography.
520 ## - SUMMARY, ETC.
Summary, etc This book reviews recent advances in symbolic execution and its probabilistic variant and discusses how they can be used to ensure the safety and security of software systems. Symbolic execution is a systematic program analysis technique which explores multiple program behaviors all at once by collecting and solving symbolic constraints collected from the branching conditions in the program. The obtained solutions can be used as test inputs that execute feasible program paths. Symbolic execution has found many applications in various domains, such as security, smartphone applications, operating systems, databases, and more recently deep neural networks, uncovering subtle errors and unknown vulnerabilities. We review here the technique has also been extended to reason about algorithmic complexity and resource consumption. Furthermore, symbolic execution has been recently extended with probabilistic reasoning, allowing one to reason about quantitative properties of software systems. The approach computes the conditions to reach target program events of interest and uses model counting to quantify the fraction of the input domain satisfying these conditions thus computing the probability of event occurrence. This probabilistic information can be used for example to compute the reliability of an aircraft controller under different wind conditions (modeled probabilistically) or to quantify the leakage of sensitive data in a software system, using information theory metrics such as Shannon entropy. This book is intended for students and software engineers who are interested in advanced techniques for testing and verifying software systems.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-02551-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2020.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mathematics.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software engineering.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Technology and Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mathematics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software Engineering.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2328-3327
912 ## -
-- ZDB-2-SXSC

No items available.