Results 31 to 40 of about 970,866 (376)

Combining static analysis error traces with dynamic symbolic execution (experience paper)

open access: yesInternational Symposium on Software Testing and Analysis, 2022
This paper reports on our experience implementing a technique for sifting through static analysis reports using dynamic symbolic execution. Our insight is that if a static analysis tool produces a partial trace through the program under analysis ...
Frank Busse   +3 more
semanticscholar   +1 more source

TracerX: Dynamic Symbolic Execution with Interpolation (Competition Contribution) [PDF]

open access: yesFundamental Approaches to Software Engineering23rd International Conference, 2020
Dynamic Symbolic Execution (DSE) is an important method for testing of programs. An important system on DSE is KLEE [1] which inputs a C/C++ program annotated with symbolic variables, compiles it into LLVM, and then emulates the execution paths of LLVM ...
Jaffar J, Maghareh R, Godboley S, Ha X.
europepmc   +3 more sources

Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts [PDF]

open access: yesInternational Conference on Automated Software Engineering, 2019
An effective way to maximize code coverage in software tests is through dynamic symbolic execution—a technique that uses constraint solving to systematically explore a program's state space.
Mark Mossberg   +7 more
semanticscholar   +1 more source

Noninterference via Symbolic Execution [PDF]

open access: yes, 2012
Noninterference is a high-level security property that guarantees the absence of illicit information flow at runtime. Noninterference can be enforced statically using information flow type systems; however, these are criticized for being overly conservative and rejecting secure programs.
Milushev D., Beck W., Clarke D.
openaire   +3 more sources

Verified symbolic execution with Kripke specification monads (and no meta-programming)

open access: yesProc. ACM Program. Lang., 2022
Verifying soundness of symbolic execution-based program verifiers is a significant challenge. This is especially true if the resulting tool needs to be usable outside of the proof assistant, in which case we cannot rely on shallowly embedded assertion ...
Steven Keuchel   +3 more
semanticscholar   +1 more source

Opaque Predicate Construction Algorithm Without Size Constraints [PDF]

open access: yesJisuanji kexue, 2023
Combined with opaque predicate,control flow obfuscation enables semantics-preserving transformations,which can achieve the purpose of code protection.However,existing opaque predicate is easily attacked by symbolic execution and has the problem of small ...
WANG Yufang, LE Deguang, Jack TAN, XIAO Le, GONG Shengrong
doaj   +1 more source

Directed Grey-box Fuzzing Test Technology Combining Mixed Symbolic Execution [PDF]

open access: yesJisuanji gongcheng, 2020
Directed Gray-box Fuzzing(DGF) test is a kind of fuzzing test technique which can quickly generate test cases to reach a given target area of the program and find vulnerabilities,but the existing DGF technique often fail to pass the checking statements ...
DAI Wei, LU Yuliang, ZHU Kailong
doaj   +1 more source

Self-composition by Symbolic Execution [PDF]

open access: yes, 2013
This work is licensed under a CC-BY Creative Commons Attribution 3.0 Unported license (http://creativecommons.org/licenses/by/3.0/)urn: urn:nbn:de:0030-drops-42770urn: urn:nbn:de:0030-drops-42770Self-composition is a logical formulation of non ...
Phan, Q-S
core   +1 more source

Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE

open access: yesNetwork and Distributed System Security Symposium, 2021
Spectre are microarchitectural attacks which were made public in January 2018. They allow an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly important for cryptographic libraries and defenses at the software ...
Lesly-Ann Daniel   +2 more
semanticscholar   +1 more source

Rethinking Pointer Reasoning in Symbolic Execution [PDF]

open access: yes, 2017
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may quickly run out of
Coppa, Emilio   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy