Results 61 to 70 of about 970,866 (376)
Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach
Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all ...
Hutzelmann, Thomas +3 more
core +1 more source
Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding [PDF]
High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools.
Dunkels, Adam +4 more
core +2 more sources
Generation of the weakest preconditions of programs with dynamic memory in symbolic execution
Symbolic execution is a widely used method for the systematic study of program execution paths; it allows solving a number of important problems related to verification of correctness: searching for errors and vulnerabilities, automatic test generation ...
A. V. Misonizhnik +4 more
doaj +1 more source
Directed Symbolic Execution [PDF]
In this paper, we study the problem of automatically finding program executions that reach a particular target line. This problem arises in many debugging scenarios; for example, a developer may want to confirm that a bug reported by a static analysis tool on a particular line is a true positive.
Kin-Keung Ma +3 more
openaire +1 more source
Test Readability Optimization in Context of Symbolic Execution
Software testing is a time consuming process. In general, software companies spend about 50% of development time on testing. On the other hand, lack of testing implies financial and other risks.
I. A. Yakimov, A. S. Kuznetsov
doaj +1 more source
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security +2 more
core +1 more source
Symbolic types for lenient symbolic execution [PDF]
We present lambda_sym, a typed λ-calculus for lenient symbolic execution , where some language constructs do not recognize symbolic values. Its type system, however, ensures safe behavior of all symbolic values in a program.
Stephen Chang, Alex Knauth, Emina Torlak
openaire +1 more source
Sydr: Cutting Edge Dynamic Symbolic Execution [PDF]
The security development lifecycle (SDL) is becoming an industry standard. Dynamic symbolic execution (DSE) has enormous amount of applications in computer security (fuzzing, vulnerability discovery, reverse-engineering, etc.).
A. Vishnyakov +8 more
semanticscholar +1 more source
Building security predicates for some types of vulnerabilities
Approaches for code execution using program vulnerabilities are considered in this paper. Particularly, ways of code execution using buffer overflow on stack and on heap, using use-after-free vulnerabilities and format string vulnerabilities are examined
A. N. Fedotov +3 more
doaj +1 more source
A Survey of New Trends in Symbolic Execution for Software Testing and Analysis [PDF]
Symbolic execution is a well-known program analysis technique which represents values of program inputs with symbolic values instead of concrete (initialized) data and executes the program by manipulating program expressions involving the symbolic values.
Pasareanu, Corina S., Visser, Willem
core +2 more sources

