Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis

CS Păsăreanu, W Visser, D Bushnell… - Automated Software …, 2013 - Springer
Symbolic PathFinder (SPF) is a software analysis tool that combines symbolic execution with
model checking for automated test case generation and error detection in Java bytecode …

Automated energy optimization of http requests for mobile applications

D Li, Y Lyu, J Gui, WGJ Halfond - … of the 38th international conference on …, 2016 - dl.acm.org
Energy is a critical resource for apps that run on mobile devices. Among all operations,
making HTTP requests is one of the most energy consuming. Previous studies have shown …

Making web applications more energy efficient for OLED smartphones

D Li, AH Tran, WGJ Halfond - … of the 36th International Conference on …, 2014 - dl.acm.org
A smartphone's display is one of its most energy consuming components. Modern
smartphones use OLED displays that consume more energy when displaying light colors as …

Rex: Symbolic regular expression explorer

M Veanes, P De Halleux… - 2010 Third International …, 2010 - ieeexplore.ieee.org
Constraints in form regular expressions over strings are ubiquitous. They occur often in
programming languages like Perl and C#, in SQL in form of LIKE expressions, and in web …

Stranger: An Automata-Based String Analysis Tool for PHP

F Yu, M Alkhalaf, T Bultan - … Conference on Tools and Algorithms for the …, 2010 - Springer
Stranger is an automata-based string analysis tool for finding and eliminating string-related
security vulnerabilities in PHP applications. Stranger uses symbolic forward and backward …

An automata-based framework for verification and bug hunting in quantum circuits

YF Chen, KM Chung, O Lengál, JA Lin… - Proceedings of the …, 2023 - dl.acm.org
We introduce a new paradigm for analysing and finding bugs in quantum circuits. In our
approach, the problem is given by a ‍triple {P} C {Q} and the question is whether, given a set …

Automata-based model counting for string constraints

A Aydin, L Bang, T Bultan - International Conference on Computer Aided …, 2015 - Springer
Most common vulnerabilities in Web applications are due to string manipulation errors in
input validation and sanitization code. String constraint solvers are essential components of …

String analysis for side channels with segmented oracles

L Bang, A Aydin, QS Phan, CS Păsăreanu… - Proceedings of the 2016 …, 2016 - dl.acm.org
We present an automated approach for detecting and quantifying side channels in Java
programs, which uses symbolic execution, string analysis and model counting to compute …

Automata-based symbolic string analysis for vulnerability detection

F Yu, M Alkhalaf, T Bultan, OH Ibarra - Formal Methods in System Design, 2014 - Springer
Verifying string manipulating programs is a crucial problem in computer security. String
operations are used extensively within web applications to manipulate user input, and their …

Path-and index-sensitive string analysis based on monadic second-order logic

T Tateishi, M Pistoia, O Tripp - ACM Transactions on Software …, 2013 - dl.acm.org
We propose a novel technique for statically verifying the strings generated by a program.
The verification is conducted by encoding the program in Monadic Second-order Logic …