Results 21 to 30 of about 1,018,291 (234)
SymQEMU: Compilation-based symbolic execution for binaries
—Symbolic execution is a powerful technique for software analysis and bug detection. Compilation-based symbolic execution is a recently proposed flavor that has been shown to improve the performance of symbolic execution significantly when source code is ...
Sebastian Poeplau, Aurélien Francillon
semanticscholar +1 more source
CSEFuzz: Fuzz Testing Based on Symbolic Execution
Fuzz testing has been successful in finding defects of various software packages. These defects include file parsing, image processing, Internet browsers, and network protocols.
Zhangwei Xie +4 more
doaj +1 more source
Symbolic Execution for JavaScript [PDF]
We present a framework for trustworthy symbolic execution of JavaScripts programs, whose aim is to assist developers in the testing of their code: the developer writes symbolic tests for which the framework provides concrete counter-models. We create the framework following a new, general methodology for designing compositional program analyses for ...
Faustino Fragoso Femenin Dos Santos, J +4 more
openaire +2 more sources
Speculative Symbolic Execution [PDF]
14 pages, 15 ...
Zhang, Yufeng, Chen, Zhenbang, Wang, Ji
openaire +2 more sources
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts [PDF]
An effective way to maximize code coverage in software tests is through dynamic symbolic execution—a technique that uses constraint solving to systematically explore a program's state space.
Mark Mossberg +7 more
semanticscholar +1 more source
Towards Symbolic Pointers Reasoning in Dynamic Symbolic Execution [PDF]
Dynamic symbolic execution is a widely used technique for automated software testing, designed for execution paths exploration and program errors detection.
D. Kuts
semanticscholar +1 more source
Noninterference via Symbolic Execution [PDF]
Noninterference is a high-level security property that guarantees the absence of illicit information flow at runtime. Noninterference can be enforced statically using information flow type systems; however, these are criticized for being overly conservative and rejecting secure programs.
Milushev D., Beck W., Clarke D.
openaire +3 more sources
Combining static analysis error traces with dynamic symbolic execution (experience paper)
This paper reports on our experience implementing a technique for sifting through static analysis reports using dynamic symbolic execution. Our insight is that if a static analysis tool produces a partial trace through the program under analysis ...
Frank Busse +3 more
semanticscholar +1 more source
TracerX: Dynamic Symbolic Execution with Interpolation (Competition Contribution) [PDF]
Dynamic Symbolic Execution (DSE) is an important method for testing of programs. An important system on DSE is KLEE [1] which inputs a C/C++ program annotated with symbolic variables, compiles it into LLVM, and then emulates the execution paths of LLVM ...
Jaffar J, Maghareh R, Godboley S, Ha X.
europepmc +3 more sources
Verified symbolic execution with Kripke specification monads (and no meta-programming)
Verifying soundness of symbolic execution-based program verifiers is a significant challenge. This is especially true if the resulting tool needs to be usable outside of the proof assistant, in which case we cannot rely on shallowly embedded assertion ...
Steven Keuchel +3 more
semanticscholar +1 more source

