This is the first existing book focusing on string analysis
Discusses how string analysis techniques work and how they can be applied to vulnerability detection in modern software applications
This book can be used as a textbook for a course on string analysis, or as a supplementary book for a course on vulnerability detection
Rezensionen / Stimmen
"The book can be said to be tailored as a handy manual for researchers looking for algebraic approaches based on the manipulation of regular expressions (in a large sense) and on solving string constraints, over inputs provided by users in web applications, for handling security issues in these applications." (Siva Anantharaman, Mathematical Reviews, November, 2019)
Auflage
Softcover reprint of the original 1st ed. 2017
Sprache
Verlagsort
Verlagsgruppe
Springer International Publishing
Zielgruppe
Illustrationen
6
68 s/w Abbildungen, 6 farbige Abbildungen
IX, 174 p. 74 illus., 6 illus. in color.
Maße
Höhe: 235 mm
Breite: 155 mm
Dicke: 11 mm
Gewicht
ISBN-13
978-3-319-88637-4 (9783319886374)
DOI
10.1007/978-3-319-68670-7
Schweitzer Klassifikation
1 Introduction: String Manipulating Programs and Difficulty of Their Analysis.- 2 String Manipulating Programs and Difficulty of Their Analysis.- 3 State Space Exploration.- 4 Automata Based String Analysis.- 5 Relational String Analysis.- 6 Abstraction and Approximation.- 7 Constraint-based String Analysis.- 8 Vulnerability Detection and Sanitization Synthesis.- 9 Differential String Analysis and Repair.- 10 Tools.- 11 A Brief Survey of Related Work.- 12 Conclusions.