Results 61 to 70 of about 970,866 (376)

Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach

open access: yes, 2017
Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all ...
Hutzelmann, Thomas   +3 more
core   +1 more source

Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding [PDF]

open access: yes, 2010
High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools.
Dunkels, Adam   +4 more
core   +2 more sources

Generation of the weakest preconditions of programs with dynamic memory in symbolic execution

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Symbolic execution is a widely used method for the systematic study of program execution paths; it allows solving a number of important problems related to verification of correctness: searching for errors and vulnerabilities, automatic test generation ...
A. V. Misonizhnik   +4 more
doaj   +1 more source

Directed Symbolic Execution [PDF]

open access: yes, 2011
In this paper, we study the problem of automatically finding program executions that reach a particular target line. This problem arises in many debugging scenarios; for example, a developer may want to confirm that a bug reported by a static analysis tool on a particular line is a true positive.
Kin-Keung Ma   +3 more
openaire   +1 more source

Test Readability Optimization in Context of Symbolic Execution

open access: yesТруды Института системного программирования РАН, 2018
Software testing is a time consuming process. In general, software companies spend about 50% of development time on testing. On the other hand, lack of testing implies financial and other risks.
I. A. Yakimov, A. S. Kuznetsov
doaj   +1 more source

Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]

open access: yes, 2014
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security   +2 more
core   +1 more source

Symbolic types for lenient symbolic execution [PDF]

open access: yesProceedings of the ACM on Programming Languages, 2017
We present lambda_sym, a typed λ-calculus for lenient symbolic execution , where some language constructs do not recognize symbolic values. Its type system, however, ensures safe behavior of all symbolic values in a program.
Stephen Chang, Alex Knauth, Emina Torlak
openaire   +1 more source

Sydr: Cutting Edge Dynamic Symbolic Execution [PDF]

open access: yes2020 Ivannikov Ispras Open Conference (ISPRAS), 2020
The security development lifecycle (SDL) is becoming an industry standard. Dynamic symbolic execution (DSE) has enormous amount of applications in computer security (fuzzing, vulnerability discovery, reverse-engineering, etc.).
A. Vishnyakov   +8 more
semanticscholar   +1 more source

Building security predicates for some types of vulnerabilities

open access: yesТруды Института системного программирования РАН, 2018
Approaches for code execution using program vulnerabilities are considered in this paper. Particularly, ways of code execution using buffer overflow on stack and on heap, using use-after-free vulnerabilities and format string vulnerabilities are examined
A. N. Fedotov   +3 more
doaj   +1 more source

A Survey of New Trends in Symbolic Execution for Software Testing and Analysis [PDF]

open access: yes, 2009
Symbolic execution is a well-known program analysis technique which represents values of program inputs with symbolic values instead of concrete (initialized) data and executes the program by manipulating program expressions involving the symbolic values.
Pasareanu, Corina S., Visser, Willem
core   +2 more sources

Home - About - Disclaimer - Privacy