Results 1 to 10 of about 210,493 (240)
CSEFuzz: Fuzz Testing Based on Symbolic Execution [PDF]
Fuzz testing has been successful in finding defects of various software packages. These defects include file parsing, image processing, Internet browsers, and network protocols.
Zhangwei Xie +4 more
doaj +2 more sources
Directed Incremental Symbolic Execution [PDF]
The last few years have seen a resurgence of interest in the use of symbolic execution -- a program analysis technique developed more than three decades ago to analyze program execution paths.
Khurshid, Sarfraz +3 more
core +5 more sources
Program Complexity Analysis Method Combining Evolutionary Algorithm with Symbolic Execution [PDF]
The worst case execution path is an important indicator of program complexity,which helps to discover possible complexity vulnerabilities in the system.In recent years,the application of symbolic execution in program complexity analysis has made great ...
ZHOU Sheng-yi, ZENG Hong-wei
doaj +2 more sources
Relational Symbolic Execution [PDF]
Symbolic execution is a classical program analysis technique used to show that programs satisfy or violate given specifications. In this work we generalize symbolic execution to support program analysis for relational specifications in the form of ...
Banerjee Anindya +15 more
core +4 more sources
Memoized Symbolic Execution [PDF]
This paper introduces memoized symbolic execution (Memoise), a novel approach for more efficient application of forward symbolic execution, which is a well-studied technique for systematic exploration of program behaviors based on bounded execution paths.
Khurshid, Sarfraz +2 more
core +4 more sources
Symbolic Execution Techniques Extended to Systems. [PDF]
International audienceThis paper presents a symbolic execution framework devoted to system models, recursively defined by interconnecting component models.
Aiguier, Marc +3 more
core +4 more sources
Symbolic Execution as DPLL Modulo Theories [PDF]
© Quoc-Sang Phan; licensed under Creative Commons License CC-BY. Imperial College Computing Student Workshop (ICCSW’14). Editors: Rumyana Neykova and Nicholas Ng; pp. 58–65. OpenAccess Series in Informatics.
Phan, Q-S
core +4 more sources
Bounded Symbolic Execution for Runtime Error Detection of Erlang Programs [PDF]
Dynamically typed languages, like Erlang, allow developers to quickly write programs without explicitly providing any type information on expressions or function definitions. However, this feature makes those languages less reliable than statically typed
Emanuele De Angelis +4 more
doaj +5 more sources
LLM-Based Unknown Function Automated Modeling in Sensor-Driven Systems for Multi-Language Software Security Verification [PDF]
The rapid expansion of the Internet of Things (IoT) has made software security and reliability a critical concern. With multi-language programs running on edge computing, embedded systems, and sensors, each connected device represents a potential attack ...
Liangjun Deng +4 more
doaj +2 more sources
Identifying Program Entropy Characteristics with Symbolic Execution [PDF]
The security infrastructure underpinning our society relies on encryption, which relies on the correct generation and use of pseudorandom data. Unfortunately, random data is deceptively hard to generate. Implementation problems in PRNGs and the incorrect
Dutcher, Audrey Annika
core +2 more sources

