A survey of symbolic execution techniques
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
Fairfuzz: A targeted mutation strategy for increasing greybox fuzz testing coverage
In recent years, fuzz testing has proven itself to be one of the most effective techniques for
finding correctness bugs and security vulnerabilities in practice. One particular fuzz testing …
finding correctness bugs and security vulnerabilities in practice. One particular fuzz testing …
Verx: Safety verification of smart contracts
We present VerX, the first automated verifier able to prove functional properties of Ethereum
smart contracts. VerX addresses an important problem as all real-world contracts must …
smart contracts. VerX addresses an important problem as all real-world contracts must …
Mutation testing advances: an analysis and survey
Mutation testing realizes the idea of using artificial defects to support testing activities.
Mutation is typically used as a way to evaluate the adequacy of test suites, to guide the …
Mutation is typically used as a way to evaluate the adequacy of test suites, to guide the …
State of the art: Dynamic symbolic execution for automated test generation
T Chen, X Zhang, S Guo, H Li, Y Wu - Future Generation Computer Systems, 2013 - Elsevier
Dynamic symbolic execution for automated test generation consists of instrumenting and
running a program while collecting path constraint on inputs from predicates encountered in …
running a program while collecting path constraint on inputs from predicates encountered in …
Symbolic execution for software testing: three decades later
Symbolic execution for software testing Page 1 82 communicaTionS of The acm | february
2013 | vol. 56 | no. 2 review articles ill us tra tion b y marius w a tz sYMBoliC eXeCUtioN has …
2013 | vol. 56 | no. 2 review articles ill us tra tion b y marius w a tz sYMBoliC eXeCUtioN has …
Semfix: Program repair via semantic analysis
HDT Nguyen, D Qi, A Roychoudhury… - 2013 35th …, 2013 - ieeexplore.ieee.org
Debugging consumes significant time and effort in any major software development project.
Moreover, even after the root cause of a bug is identified, fixing the bug is non-trivial. Given …
Moreover, even after the root cause of a bug is identified, fixing the bug is non-trivial. Given …
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …
code in Android applications to steal sensitive data. With known techniques in the literature …
{Under-Constrained} symbolic execution: Correctness checking for real code
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
Pex–white box test generation for. net
N Tillmann, J De Halleux - International conference on tests and proofs, 2008 - Springer
Pex automatically produces a small test suite with high code coverage for a. NET program.
To this end, Pex performs a systematic program analysis (using dynamic symbolic …
To this end, Pex performs a systematic program analysis (using dynamic symbolic …