A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018‏ - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021‏ - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

Flashmeta: A framework for inductive program synthesis

O Polozov, S Gulwani - Proceedings of the 2015 ACM SIGPLAN …, 2015‏ - dl.acm.org
Inductive synthesis, or programming-by-examples (PBE) is gaining prominence with
disruptive applications for automating repetitive tasks in end-user programming. However …

Data-driven precondition inference with learned features

S Padhi, R Sharma, T Millstein - ACM SIGPLAN Notices, 2016‏ - dl.acm.org
We extend the data-driven approach to inferring preconditions for code from a set of test
executions. Prior work requires a fixed set of features, atomic predicates that define the …

[PDF][PDF] SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE. JS.

CA Staicu, M Pradel, B Livshits - NDSS, 2018‏ - staicu.org
Synode: Understanding and Automatically Preventing Injection Attacks on Node.js Page 1
Synode: Understanding and Automatically Preventing Injection Attacks on Node.js Cristian-Alexandru …

S3: A symbolic string solver for vulnerability detection in web applications

MT Trinh, DH Chu, J Jaffar - Proceedings of the 2014 ACM SIGSAC …, 2014‏ - dl.acm.org
Motivated by the vulnerability analysis of web programs which work on string inputs, we
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …

A DPLL(T) Theory Solver for a Theory of Strings and Regular Expressions

T Liang, A Reynolds, C Tinelli, C Barrett… - … Conference on Computer …, 2014‏ - Springer
An increasing number of applications in verification and security rely on or could benefit from
automatic solvers that can check the satisfiability of constraints over a rich set of data types …

A billion SMT queries a day

N Rungta - International Conference on Computer Aided …, 2022‏ - Springer
Abstract Amazon Web Services (AWS) is a cloud computing services provider that has made
significant investments in applying formal methods to proving correctness of its internal …

Automatic policy generation for {Inter-Service} access control of microservices

X Li, Y Chen, Z Lin, X Wang, JH Chen - 30th USENIX Security …, 2021‏ - usenix.org
Cloud applications today are often composed of many microservices. To prevent a
microservice from being abused by other (compromised) microservices, inter-service access …

Solving the search for source code

KT Stolee, S Elbaum, D Dobos - ACM Transactions on Software …, 2014‏ - dl.acm.org
Programmers frequently search for source code to reuse using keyword searches. The
search effectiveness in facilitating reuse, however, depends on the programmer's ability to …