Results 101 to 110 of about 1,018,291 (234)

Enhancing Reuse of Constraint Solutions to Improve Symbolic Execution

open access: yes, 2015
Constraint solution reuse is an effective approach to save the time of constraint solving in symbolic execution. Most of the existing reuse approaches are based on syntactic or semantic equivalence of constraints; e.g.
Anand Saswat   +7 more
core   +1 more source

Symbolic execution: a semantic approach

open access: yesScience of Computer Programming, 1991
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Symbolic PathFinder: Symbolic Execution of Java Bytecode [PDF]

open access: yes, 2010
Symbolic Pathfinder (SPF) combines symbolic execution with model checking and constraint solving for automated test case generation and error detection in Java programs with unspecified inputs.
Pasareanu, Corina S., Rungta, Neha
core   +1 more source

A Comprehensive Review of Static Memory Analysis

open access: yesIEEE Access
This review aims to evaluate and compare various static analysis tools across multiple programming languages for memory management. The tools and techniques under scrutiny include pattern matching, symbolic execution, CppCheck, SharpChecker, FindBugs ...
Temidayo Akinyemi   +3 more
doaj   +1 more source

Optimization of Executable Formal Interpreters Developed in Higher-Order Logic Theorem Proving Systems

open access: yesIEEE Access, 2018
In recent publications, we presented a novel formal symbolic process virtual machine (FSPVM) framework that combined higher-order logic theorem proving and symbolic execution for verifying the reliability and security of smart contracts developed in the ...
Zheng Yang, Hang Lei
doaj   +1 more source

Dependence Guided Symbolic Execution

open access: yesIEEE Transactions on Software Engineering, 2017
Symbolic execution is a powerful technique for systematically exploring the paths of a program and generating the corresponding test inputs. However, its practical usage is often limited by the path explosion problem, that is, the number of explored paths usually grows exponentially with the increase of program size.
Haijun Wang   +5 more
openaire   +1 more source

A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

open access: yes, 2015
In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs.
Hainaut, Jean-Luc   +2 more
core  

Comparative analysis of two approaches to the static taint analysis

open access: yesТруды Института системного программирования РАН, 2018
Currently, one of the most efficient ways to find software security problems is taint analysis. It can be based on static analysis and successfully detect errors that lead to vulnerabilities, such as code injection or leaks of private information ...
M. V. Belyaev   +3 more
doaj   +1 more source

Compositional symbolic execution semantics

open access: yesTheoretical Computer Science
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Erik Voogd   +3 more
openaire   +2 more sources

Derivative-Guided Symbolic Execution

open access: yesProceedings of the ACM on Programming Languages
We consider the formulation of a symbolic execution (SE) procedure for functional programs that interact with effectful, opaque libraries. Our procedure allows specifications of libraries and abstract data type (ADT) methods that are expressed in Linear Temporal Logic over Finite Traces (LTL
Yongwei Yuan   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy