Results 171 to 180 of about 1,018,291 (234)
Some of the next articles are maybe not open access.

Processor Verification using Symbolic Execution: A RISC-V Case-Study

Design, Automation and Test in Europe, 2023
We propose to leverage state-of-the-art symbolic execution techniques from the Software (SW) domain for processor verification at the Register-Transfer Level (RTL).
Niklas Bruns, V. Herdt, R. Drechsler
semanticscholar   +1 more source

Sylvia: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs

Formal Methods in Computer-Aided Design, 2023
Symbolic execution is a powerful verification tool for hardware designs, in particular for security validation. However, symbolic execution suffers from the path explosion problem in which the number of paths to explore grows exponentially with the ...
Kaki Ryan, C. Sturton
semanticscholar   +1 more source

Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution

International Symposium on Software Testing and Analysis, 2022
Symbolic detection has been widely used to detect vulnerabilities in smart contracts. Unfortunately, as reported, existing symbolic tools cost too much time, since they need to execute all paths to detect vulnerabilities.
Peilin Zheng, Zibin Zheng, Xiapu Luo
semanticscholar   +1 more source

Learning to Explore Paths for Symbolic Execution

Conference on Computer and Communications Security, 2021
Symbolic execution is a powerful technique that can generate tests steering program execution into desired paths. However, the scalability of symbolic execution is often limited by path explosion, i.e., the number of symbolic states representing the ...
Jingxuan He   +3 more
semanticscholar   +1 more source

Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms

Asia-Pacific Computer Systems Architecture Conference, 2021
Existing symbolic execution typically assumes the analyzer can control the I/O environment and/or access the library code, which, however, is not the case when programs run on a remote proprietary execution environment managed by another party.
Lannan Luo   +4 more
semanticscholar   +1 more source

Synthesize solving strategy for symbolic execution

International Symposium on Software Testing and Analysis, 2021
Symbolic execution is powered by constraint solving. The advancement of constraint solving boosts the development and the applications of symbolic execution.
Zhenbang Chen   +6 more
semanticscholar   +1 more source

Augmented dynamic symbolic execution

Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, 2012
Dynamic symbolic execution (DSE) can efficiently explore all simple paths through a program, reliably determining whether there are any program crashes or violations of assertions or code contracts. However, if such automated oracles do not exist, the traditional approach is to present the developer a small and representative set of tests in order to ...
Konrad Jamrozik   +3 more
openaire   +1 more source

WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection

International Conference on Software Quality, Reliability and Security, 2021
Many popular blockchain platforms support smart contracts for building decentralized applications. However, the vulnerabilities within smart contracts have demonstrated to lead to serious financial loss to their end users.
B. Jiang   +4 more
semanticscholar   +1 more source

Boosting symbolic execution via constraint solving time prediction (experience paper)

International Symposium on Software Testing and Analysis, 2021
Symbolic execution is an essential approach for automated test case generation. However, the approach is generally not scalable to large programs. One critical reason is that the constraint solving problems in symbolic execution are generally hard ...
Sicheng Luo   +4 more
semanticscholar   +1 more source

On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution

The Web Conference, 2021
Symbolic execution has been widely applied in detecting vulnerabilities in web applications. Modeling language-specific built-in functions is essential for symbolic execution.
Penghui Li   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy