Results 41 to 50 of about 308 (122)
Automatic Testing of Program Slicers
Program slicing is a technique to extract the part of a program (the slice) that influences or is influenced by a set of variables at a given point (the slicing criterion). Computing minimal slices is undecidable in the general case, and obtaining the minimal slice of a given program is normally computationally prohibitive even for very small programs.
Sergio Pérez +3 more
wiley +1 more source
Discover deeper bugs with dynamic symbolic execution and coverage‐based fuzz testing
Coverage‐based fuzz testing and dynamic symbolic execution are both popular program testing techniques. However, on their own, both techniques suffer from scalability problems when considering the complexity of modern software. Hybrid testing methods attempt to mitigate these problems by leveraging dynamic symbolic execution to assist fuzz testing ...
Bin Zhang +5 more
wiley +1 more source
The progress, challenges, and perspectives of directed greybox fuzzing
Based on the investigation of 42 state‐of‐the‐art fuzzers that are closely related to directed greybox fuzzing (DGF), we conduct the first in‐depth study to summarize the empirical evidence on the research progress of DGF. By analyzing the benefits and limitations of DGF research, we try to identify gaps in current research.
Pengfei Wang +5 more
wiley +1 more source
How test suites impact fault localisation starting from the size
Although a test suite is indispensable for conducting effective fault localisation, not much work has been done to study how the test suite impacts fault localisation. This study presents a systematic study for a deeper understanding of their relation.
Yan Lei +3 more
wiley +1 more source
CAFA: A Checksum‐Aware Fuzzing Assistant Tool for Coverage Improvement
Fuzzing is an effective technique to discover vulnerabilities that involves testing applications by constructing invalid input data. However, for applications with checksum mechanism, fuzzing can only achieve low coverage because samples generated by the fuzzer are possibly incapable of passing the checksum verification.
Xiaolong Liu +5 more
wiley +1 more source
Behaviour Preservation across Code Versions in Erlang
In any alive and nontrivial program, the source code naturally evolves along the lifecycle for many reasons such as the implementation of new functionality, the optimization of a bottleneck, or the refactoring of an obscure function. Frequently, these code changes affect various different functions and modules, so it can be difficult to know whether ...
David Insa +4 more
wiley +1 more source
Smart fuzzing method for detecting stack‐based buffer overflow in binary codes
During the past decades several methods have been proposed to detect the stack‐based buffer overflow vulnerability, though it is still a serious threat to the computer systems. Among the suggested methods, various fuzzers have been proposed to detect this vulnerability.
Maryam Mouzarani +2 more
wiley +1 more source
GreyConE: Greybox fuzzing+Concolic execution guided test generation for high level design [PDF]
Mukta Debnath +3 more
openalex +1 more source
On the Completeness of Selective Unification in Concolic Testing of Logic Programs [PDF]
Étienne Payet +2 more
openalex +2 more sources

