Results 41 to 50 of about 308 (122)

Automatic Testing of Program Slicers

open access: yesScientific Programming, Volume 2019, Issue 1, 2019., 2019
Program slicing is a technique to extract the part of a program (the slice) that influences or is influenced by a set of variables at a given point (the slicing criterion). Computing minimal slices is undecidable in the general case, and obtaining the minimal slice of a given program is normally computationally prohibitive even for very small programs.
Sergio Pérez   +3 more
wiley   +1 more source

Discover deeper bugs with dynamic symbolic execution and coverage‐based fuzz testing

open access: yesIET Software, Volume 12, Issue 6, Page 507-519, December 2018., 2018
Coverage‐based fuzz testing and dynamic symbolic execution are both popular program testing techniques. However, on their own, both techniques suffer from scalability problems when considering the complexity of modern software. Hybrid testing methods attempt to mitigate these problems by leveraging dynamic symbolic execution to assist fuzz testing ...
Bin Zhang   +5 more
wiley   +1 more source

The progress, challenges, and perspectives of directed greybox fuzzing

open access: yesSoftware Testing, Verification and Reliability, Volume 34, Issue 2, March 2024.
Based on the investigation of 42 state‐of‐the‐art fuzzers that are closely related to directed greybox fuzzing (DGF), we conduct the first in‐depth study to summarize the empirical evidence on the research progress of DGF. By analyzing the benefits and limitations of DGF research, we try to identify gaps in current research.
Pengfei Wang   +5 more
wiley   +1 more source

How test suites impact fault localisation starting from the size

open access: yesIET Software, Volume 12, Issue 3, Page 190-205, June 2018., 2018
Although a test suite is indispensable for conducting effective fault localisation, not much work has been done to study how the test suite impacts fault localisation. This study presents a systematic study for a deeper understanding of their relation.
Yan Lei   +3 more
wiley   +1 more source

CAFA: A Checksum‐Aware Fuzzing Assistant Tool for Coverage Improvement

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Fuzzing is an effective technique to discover vulnerabilities that involves testing applications by constructing invalid input data. However, for applications with checksum mechanism, fuzzing can only achieve low coverage because samples generated by the fuzzer are possibly incapable of passing the checksum verification.
Xiaolong Liu   +5 more
wiley   +1 more source

Behaviour Preservation across Code Versions in Erlang

open access: yesScientific Programming, Volume 2018, Issue 1, 2018., 2018
In any alive and nontrivial program, the source code naturally evolves along the lifecycle for many reasons such as the implementation of new functionality, the optimization of a bottleneck, or the refactoring of an obscure function. Frequently, these code changes affect various different functions and modules, so it can be difficult to know whether ...
David Insa   +4 more
wiley   +1 more source

Smart fuzzing method for detecting stack‐based buffer overflow in binary codes

open access: yesIET Software, Volume 10, Issue 4, Page 96-107, August 2016., 2016
During the past decades several methods have been proposed to detect the stack‐based buffer overflow vulnerability, though it is still a serious threat to the computer systems. Among the suggested methods, various fuzzers have been proposed to detect this vulnerability.
Maryam Mouzarani   +2 more
wiley   +1 more source

GreyConE: Greybox fuzzing+Concolic execution guided test generation for high level design [PDF]

open access: green, 2022
Mukta Debnath   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy