Results 61 to 70 of about 1,018,291 (234)

Symbolic types for lenient symbolic execution [PDF]

open access: yesProceedings of the ACM on Programming Languages, 2017
We present lambda_sym, a typed λ-calculus for lenient symbolic execution , where some language constructs do not recognize symbolic values. Its type system, however, ensures safe behavior of all symbolic values in a program.
Stephen Chang, Alex Knauth, Emina Torlak
openaire   +1 more source

Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach

open access: yes, 2017
Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all ...
Hutzelmann, Thomas   +3 more
core   +1 more source

Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding [PDF]

open access: yes, 2010
High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools.
Dunkels, Adam   +4 more
core   +2 more sources

Building security predicates for some types of vulnerabilities

open access: yesТруды Института системного программирования РАН, 2018
Approaches for code execution using program vulnerabilities are considered in this paper. Particularly, ways of code execution using buffer overflow on stack and on heap, using use-after-free vulnerabilities and format string vulnerabilities are examined
A. N. Fedotov   +3 more
doaj   +1 more source

Symbolic Partial-Order Execution for Testing Multi-Threaded Programs

open access: yes, 2020
We describe a technique for systematic testing of multi-threaded programs. We combine Quasi-Optimal Partial-Order Reduction, a state-of-the-art technique that tackles path explosion due to interleaving non-determinism, with symbolic execution to handle ...
A Farzan   +22 more
core   +1 more source

Sydr: Cutting Edge Dynamic Symbolic Execution [PDF]

open access: yes2020 Ivannikov Ispras Open Conference (ISPRAS), 2020
The security development lifecycle (SDL) is becoming an industry standard. Dynamic symbolic execution (DSE) has enormous amount of applications in computer security (fuzzing, vulnerability discovery, reverse-engineering, etc.).
A. Vishnyakov   +8 more
semanticscholar   +1 more source

Chopped symbolic execution

open access: yesProceedings of the 40th International Conference on Software Engineering, 2018
Symbolic execution is a powerful program analysis technique that systematically explores multiple program paths. However, despite important technical advances, symbolic execution often struggles to reach deep parts of the code due to the well-known path explosion problem and constraint solving limitations.
Trabish, D   +3 more
openaire   +2 more sources

Badger: Complexity Analysis with Fuzzing and Symbolic Execution

open access: yes, 2018
Hybrid testing approaches that involve fuzz testing and symbolic execution have shown promising results in achieving high code coverage, uncovering subtle errors and vulnerabilities in a variety of software applications. In this paper we describe Badger -
Ammons Glenn   +6 more
core   +1 more source

A Survey of New Trends in Symbolic Execution for Software Testing and Analysis [PDF]

open access: yes, 2009
Symbolic execution is a well-known program analysis technique which represents values of program inputs with symbolic values instead of concrete (initialized) data and executes the program by manipulating program expressions involving the symbolic values.
Pasareanu, Corina S., Visser, Willem
core   +2 more sources

On the Automatic Analysis of the Practical Resistance of Obfusting Transformations

open access: yesМоделирование и анализ информационных систем, 2019
A method is developed for assessing the practical persistence of obfuscating transformations of programs based on the calculation of the similarity index for the original, obfuscated and deobfuscated programs.
Petr D. Borisov, Yu. V. Kosolapov
doaj   +1 more source

Home - About - Disclaimer - Privacy