Results 51 to 60 of about 1,018,291 (234)
Formalization of Error Criteria for static symbolic execution
This paper is devoted to the formalization of the error criteria for program static analysis, based on symbolic execution. Using the original error criteria of symbolic execution approach in program static analysis leads to an excessive number of false ...
V. K. Koshelev
doaj +1 more source
Security protocol code analysis method combining model learning and symbolic execution
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path ...
ZHANG Xieli, ZHU Yuefei, GU Chunxiang, CHEN Xi
doaj +3 more sources
Compact Symbolic Execution [PDF]
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It proceeds in two steps. First, we analyse cyclic paths in the control flow graph of a given program, independently from the rest of the program. Our goal is to compute a so called template for each such a cyclic path.
Slabý, Jiří +2 more
openaire +2 more sources
PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution [PDF]
The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means to determine the maliciousness of the documents.However,attackers can adopt high obfuscation ...
SONG Enzhou, HU Tao, YI Peng, WANG Wenbo
doaj +1 more source
Ffuzz: Towards full system high coverage fuzz testing on binary executables. [PDF]
Bugs and vulnerabilities in binary executables threaten cyber security. Current discovery methods, like fuzz testing, symbolic execution and manual analysis, both have advantages and disadvantages when exercising the deeper code area in binary ...
Bin Zhang +4 more
doaj +1 more source
Killing Stubborn Mutants with Symbolic Execution [PDF]
We introduce SEMu, a Dynamic Symbolic Execution technique that generates test inputs capable of killing stubborn mutants (killable mutants that remain undetected after a reasonable amount of testing). SEMu aims at mutant propagation (triggering erroneous
T. Chekam +3 more
semanticscholar +1 more source
Shadow symbolic execution for better testing of evolving software [PDF]
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic execution. At a high-level, our technique runs two different program versions in the same symbolic execution instance, with the old version effectively ...
Cadar, C, Palikareva, H
core +2 more sources
Generation of the weakest preconditions of programs with dynamic memory in symbolic execution
Symbolic execution is a widely used method for the systematic study of program execution paths; it allows solving a number of important problems related to verification of correctness: searching for errors and vulnerabilities, automatic test generation ...
A. V. Misonizhnik +4 more
doaj +1 more source
Directed Symbolic Execution [PDF]
In this paper, we study the problem of automatically finding program executions that reach a particular target line. This problem arises in many debugging scenarios; for example, a developer may want to confirm that a bug reported by a static analysis tool on a particular line is a true positive.
Kin-Keung Ma +3 more
openaire +1 more source
Test Readability Optimization in Context of Symbolic Execution
Software testing is a time consuming process. In general, software companies spend about 50% of development time on testing. On the other hand, lack of testing implies financial and other risks.
I. A. Yakimov, A. S. Kuznetsov
doaj +1 more source

