Combining static analysis error traces with dynamic symbolic execution (experience paper)
This paper reports on our experience implementing a technique for sifting through static analysis reports using dynamic symbolic execution. Our insight is that if a static analysis tool produces a partial trace through the program under analysis ...
Frank Busse +3 more
semanticscholar +1 more source
TracerX: Dynamic Symbolic Execution with Interpolation (Competition Contribution) [PDF]
Dynamic Symbolic Execution (DSE) is an important method for testing of programs. An important system on DSE is KLEE [1] which inputs a C/C++ program annotated with symbolic variables, compiles it into LLVM, and then emulates the execution paths of LLVM ...
Jaffar J, Maghareh R, Godboley S, Ha X.
europepmc +3 more sources
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts [PDF]
An effective way to maximize code coverage in software tests is through dynamic symbolic execution—a technique that uses constraint solving to systematically explore a program's state space.
Mark Mossberg +7 more
semanticscholar +1 more source
Noninterference via Symbolic Execution [PDF]
Noninterference is a high-level security property that guarantees the absence of illicit information flow at runtime. Noninterference can be enforced statically using information flow type systems; however, these are criticized for being overly conservative and rejecting secure programs.
Milushev D., Beck W., Clarke D.
openaire +3 more sources
Verified symbolic execution with Kripke specification monads (and no meta-programming)
Verifying soundness of symbolic execution-based program verifiers is a significant challenge. This is especially true if the resulting tool needs to be usable outside of the proof assistant, in which case we cannot rely on shallowly embedded assertion ...
Steven Keuchel +3 more
semanticscholar +1 more source
Opaque Predicate Construction Algorithm Without Size Constraints [PDF]
Combined with opaque predicate,control flow obfuscation enables semantics-preserving transformations,which can achieve the purpose of code protection.However,existing opaque predicate is easily attacked by symbolic execution and has the problem of small ...
WANG Yufang, LE Deguang, Jack TAN, XIAO Le, GONG Shengrong
doaj +1 more source
Directed Grey-box Fuzzing Test Technology Combining Mixed Symbolic Execution [PDF]
Directed Gray-box Fuzzing(DGF) test is a kind of fuzzing test technique which can quickly generate test cases to reach a given target area of the program and find vulnerabilities,but the existing DGF technique often fail to pass the checking statements ...
DAI Wei, LU Yuliang, ZHU Kailong
doaj +1 more source
Self-composition by Symbolic Execution [PDF]
This work is licensed under a CC-BY Creative Commons Attribution 3.0 Unported license (http://creativecommons.org/licenses/by/3.0/)urn: urn:nbn:de:0030-drops-42770urn: urn:nbn:de:0030-drops-42770Self-composition is a logical formulation of non ...
Phan, Q-S
core +1 more source
Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE
Spectre are microarchitectural attacks which were made public in January 2018. They allow an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly important for cryptographic libraries and defenses at the software ...
Lesly-Ann Daniel +2 more
semanticscholar +1 more source
Rethinking Pointer Reasoning in Symbolic Execution [PDF]
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may quickly run out of
Coppa, Emilio +2 more
core +1 more source

