Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities - Archive ouverte HAL Access content directly
Conference Papers Year : 2021

Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities

(1, 2) , (3) , (1, 4) , (1, 4)
1
2
3
4
Fichier principal
Vignette du fichier
fdep2021.pdf (354.71 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

cea-03499614 , version 1 (21-12-2021)

Identifiers

  • HAL Id : cea-03499614 , version 1

Cite

Guilhem Lacombe, David Feliot, Etienne Boespflug, Marie-Laure Potet. Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities. PROOFS WORKSHOP (SECURITY PROOFS FOR EMBEDDED SYSTEMS), Sep 2021, Beijing, China. ⟨cea-03499614⟩
54 View
211 Download

Share

Gmail Facebook Twitter LinkedIn More