A survey of symbolic execution techniques
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
Enhancing symbolic execution with veritesting
We present MergePoint, a new binary-only symbolic execution system for large-scale and
fully unassisted testing of commodity off-the-shelf (COTS) software. MergePoint introduces …
fully unassisted testing of commodity off-the-shelf (COTS) software. MergePoint introduces …
Efficient state merging in symbolic execution
Symbolic execution has proven to be a practical technique for building automated test case
generation and bug finding tools. Nevertheless, due to state explosion, these tools still …
generation and bug finding tools. Nevertheless, due to state explosion, these tools still …
{FIE} on firmware: Finding vulnerabilities in embedded systems using symbolic execution
Embedded systems increasingly use software-driven low-power microprocessors for
security-critical settings, surfacing a need for tools that can audit the security of the software …
security-critical settings, surfacing a need for tools that can audit the security of the software …
Automated software test generation: some challenges, solutions, and recent advances
G Candea, P Godefroid - Computing and Software Science: State of the …, 2019 - Springer
The automation of software testing promises to delegate to machines what is otherwise the
most labor-intensive and expensive part of software development. The past decade has …
most labor-intensive and expensive part of software development. The past decade has …
Hunting the haunter-efficient relational symbolic execution for spectre with haunted relse
Spectre are microarchitectural attacks which were made public in January 2018. They allow
an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly …
an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly …
KLEESpectre: Detecting information leakage through speculative cache attacks via symbolic execution
Spectre-style attacks disclosed in early 2018 expose data leakage scenarios via cache side
channels. Specifically, speculatively executed paths due to branch mis-prediction may bring …
channels. Specifically, speculatively executed paths due to branch mis-prediction may bring …
Optimizing Data Shuffling in {Data-Parallel} Computation by Understanding {User-Defined} Functions
Map/Reduce style data-parallel computation is characterized by the extensive use of user-
defined functions for data processing and relies on data-shuffling stages to prepare data …
defined functions for data processing and relies on data-shuffling stages to prepare data …
Constructing semantic models of programs with the software analysis workbench
Abstract The Software Analysis Workbench (SAW) is a system for translating programs into
logical expressions, transforming these expressions, and using external reasoning tools …
logical expressions, transforming these expressions, and using external reasoning tools …
Quantitative Robustness for Vulnerability Assessment
G Girol, G Lacombe, S Bardin - … of the ACM on Programming Languages, 2024 - dl.acm.org
Most software analysis techniques focus on bug reachability. However, this approach is not
ideal for security evaluation as it does not take into account the difficulty of triggering said …
ideal for security evaluation as it does not take into account the difficulty of triggering said …