Results 101 to 110 of about 1,018,291 (234)
Enhancing Reuse of Constraint Solutions to Improve Symbolic Execution
Constraint solution reuse is an effective approach to save the time of constraint solving in symbolic execution. Most of the existing reuse approaches are based on syntactic or semantic equivalence of constraints; e.g.
Anand Saswat +7 more
core +1 more source
Symbolic execution: a semantic approach
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
Symbolic PathFinder: Symbolic Execution of Java Bytecode [PDF]
Symbolic Pathfinder (SPF) combines symbolic execution with model checking and constraint solving for automated test case generation and error detection in Java programs with unspecified inputs.
Pasareanu, Corina S., Rungta, Neha
core +1 more source
A Comprehensive Review of Static Memory Analysis
This review aims to evaluate and compare various static analysis tools across multiple programming languages for memory management. The tools and techniques under scrutiny include pattern matching, symbolic execution, CppCheck, SharpChecker, FindBugs ...
Temidayo Akinyemi +3 more
doaj +1 more source
In recent publications, we presented a novel formal symbolic process virtual machine (FSPVM) framework that combined higher-order logic theorem proving and symbolic execution for verifying the reliability and security of smart contracts developed in the ...
Zheng Yang, Hang Lei
doaj +1 more source
Dependence Guided Symbolic Execution
Symbolic execution is a powerful technique for systematically exploring the paths of a program and generating the corresponding test inputs. However, its practical usage is often limited by the path explosion problem, that is, the number of explored paths usually grows exponentially with the increase of program size.
Haijun Wang +5 more
openaire +1 more source
A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs
In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs.
Hainaut, Jean-Luc +2 more
core
Comparative analysis of two approaches to the static taint analysis
Currently, one of the most efficient ways to find software security problems is taint analysis. It can be based on static analysis and successfully detect errors that lead to vulnerabilities, such as code injection or leaks of private information ...
M. V. Belyaev +3 more
doaj +1 more source
Compositional symbolic execution semantics
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Erik Voogd +3 more
openaire +2 more sources
Derivative-Guided Symbolic Execution
We consider the formulation of a symbolic execution (SE) procedure for functional programs that interact with effectful, opaque libraries. Our procedure allows specifications of libraries and abstract data type (ADT) methods that are expressed in Linear Temporal Logic over Finite Traces (LTL
Yongwei Yuan +3 more
openaire +2 more sources

