Results 1 to 10 of about 1,018,291 (234)

Directed incremental symbolic execution [PDF]

open access: yesProceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
The last few years have seen a resurgence of interest in the use of symbolic execution -- a program analysis technique developed more than three decades ago to analyze program execution paths. Scaling symbolic execution and other path-sensitive analysis techniques to large systems remains challenging despite recent algorithmic and ...
Guowei Yang   +3 more
openaire   +5 more sources

Relational Symbolic Execution [PDF]

open access: yesProceedings of the 21st International Symposium on Principles and Practice of Declarative Programming, 2019
Symbolic execution is a classical program analysis technique used to show that programs satisfy or violate given specifications. In this work we generalize symbolic execution to support program analysis for relational specifications in the form of relational properties - these are properties about two runs of two programs on related inputs, or about ...
Farina, Gian Pietro   +2 more
openaire   +5 more sources

Memoized symbolic execution [PDF]

open access: yesProceedings of the 2012 International Symposium on Software Testing and Analysis, 2012
This paper introduces memoized symbolic execution (Memoise), a new approach for more efficient application of forward symbolic execution, which is a well-studied technique for systematic exploration of program behaviors based on bounded execution paths.
Guowei Yang   +2 more
openaire   +4 more sources

Bounded Symbolic Execution for Runtime Error Detection of Erlang Programs [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2018
Dynamically typed languages, like Erlang, allow developers to quickly write programs without explicitly providing any type information on expressions or function definitions. However, this feature makes those languages less reliable than statically typed
Emanuele De Angelis   +4 more
doaj   +5 more sources

LLM-Based Unknown Function Automated Modeling in Sensor-Driven Systems for Multi-Language Software Security Verification [PDF]

open access: yesSensors
The rapid expansion of the Internet of Things (IoT) has made software security and reliability a critical concern. With multi-language programs running on edge computing, embedded systems, and sensors, each connected device represents a potential attack ...
Liangjun Deng   +4 more
doaj   +2 more sources

Quantum symbolic execution

open access: yesQuantum Information Processing, 2023
With advances in quantum computing, researchers can now write and run many quantum programs. However, there is still a lack of effective methods for debugging quantum programs. In this paper, quantum symbolic execution (QSE) is proposed to generate test cases, which helps to finding bugs in quantum programs.
Jiang Nan, Wang Zichen, Wang Jian
openaire   +2 more sources

EtWExplorer: Multi-Priority Scheduling Path Exploration Technology Based on Abstract Syntax Tree Analysis

open access: yesApplied Sciences, 2022
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically.
Xinglu He, Pengfei Wang, Kai Lu, Xu Zhou
doaj   +1 more source

SENinja: A symbolic execution plugin for Binary Ninja

open access: yesSoftwareX, 2022
Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code.
Luca Borzacchiello   +2 more
doaj   +1 more source

Mutation‐inspired symbolic execution for software testing

open access: yesIET Software, 2022
Software testing is a complex and costly stage during the software development lifecycle. Nowadays, there is a wide variety of solutions to reduce testing costs and improve test quality. Focussing on test case generation, Dynamic Symbolic Execution (DSE)
Kevin J. Valle‐Gómez   +3 more
doaj   +1 more source

Metrics for code obfuscation based on symbolic execution and N-scope complexity

open access: yes网络与信息安全学报, 2022
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj   +3 more sources

Home - About - Disclaimer - Privacy