Download now Free registration required
This paper describes an emulated approach to collect traces of program states, in order to verify formally that these traces belong to the algorithm accepted by the provided graph for the Finite State Machine (FSM) specification. Shuntaint can attack most types of erros which allow the execution of arbitrary code. Exploring program states for security testing in the server deamons. This approach allows to detect entry points that cause the memory corruptions to be reached during exploration of states at specific moments of execution using network requests.
- Format: PDF
- Size: 248.7 KB