z-logo
open-access-imgOpen Access
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
Author(s) -
Guilhem Lacombe,
David Féliot,
Etienne Boespflug,
Marie-Laure Potet
Publication year - 2022
Publication title -
epic series in computing
Language(s) - English
Resource type - Conference proceedings
ISSN - 2398-7340
DOI - 10.29007/jp9w
Subject(s) - toolchain , computer science , fault injection , symbolic execution , static analysis , model checking , context (archaeology) , audit , execution time , certification , fuzz testing , task (project management) , worst case execution time , distributed computing , computer security , embedded system , software , programming language , biology , paleontology , management , political science , law , economics

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom