A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Enhancing symbolic execution with veritesting

T Avgerinos, A Rebert, SK Cha, D Brumley - Proceedings of the 36th …, 2014 - dl.acm.org
We present MergePoint, a new binary-only symbolic execution system for large-scale and
fully unassisted testing of commodity off-the-shelf (COTS) software. MergePoint introduces …

Efficient state merging in symbolic execution

V Kuznetsov, J Kinder, S Bucur, G Candea - Acm Sigplan Notices, 2012 - dl.acm.org
Symbolic execution has proven to be a practical technique for building automated test case
generation and bug finding tools. Nevertheless, due to state explosion, these tools still …

{FIE} on firmware: Finding vulnerabilities in embedded systems using symbolic execution

D Davidson, B Moench, T Ristenpart… - 22nd USENIX Security …, 2013 - usenix.org
Embedded systems increasingly use software-driven low-power microprocessors for
security-critical settings, surfacing a need for tools that can audit the security of the software …

Automated software test generation: some challenges, solutions, and recent advances

G Candea, P Godefroid - Computing and Software Science: State of the …, 2019 - Springer
The automation of software testing promises to delegate to machines what is otherwise the
most labor-intensive and expensive part of software development. The past decade has …

Hunting the haunter-efficient relational symbolic execution for spectre with haunted relse

LA Daniel, S Bardin, T Rezk - NDSS 2021-Network and Distributed …, 2021 - inria.hal.science
Spectre are microarchitectural attacks which were made public in January 2018. They allow
an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly …

KLEESpectre: Detecting information leakage through speculative cache attacks via symbolic execution

G Wang, S Chattopadhyay, AK Biswas, T Mitra… - ACM Transactions on …, 2020 - dl.acm.org
Spectre-style attacks disclosed in early 2018 expose data leakage scenarios via cache side
channels. Specifically, speculatively executed paths due to branch mis-prediction may bring …

Optimizing Data Shuffling in {Data-Parallel} Computation by Understanding {User-Defined} Functions

J Zhang, H Zhou, R Chen, X Fan, Z Guo, H Lin… - … USENIX Symposium on …, 2012 - usenix.org
Map/Reduce style data-parallel computation is characterized by the extensive use of user-
defined functions for data processing and relies on data-shuffling stages to prepare data …

Constructing semantic models of programs with the software analysis workbench

R Dockins, A Foltzer, J Hendrix, B Huffman… - … . Theories, Tools, and …, 2016 - Springer
Abstract The Software Analysis Workbench (SAW) is a system for translating programs into
logical expressions, transforming these expressions, and using external reasoning tools …

Quantitative Robustness for Vulnerability Assessment

G Girol, G Lacombe, S Bardin - … of the ACM on Programming Languages, 2024 - dl.acm.org
Most software analysis techniques focus on bug reachability. However, this approach is not
ideal for security evaluation as it does not take into account the difficulty of triggering said …