A survey of symbolic execution techniques
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics
Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective
vulnerability assessment; ie, it can greatly help security experts put their time and effort to …
vulnerability assessment; ie, it can greatly help security experts put their time and effort to …
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Existing greybox fuzzers mainly utilize program coverage as the goal to guide the fuzzing
process. To maximize their outputs, coverage-based greybox fuzzers need to evaluate the …
process. To maximize their outputs, coverage-based greybox fuzzers need to evaluate the …
Automatically Reasoning About How Systems Code Uses the {CPU} Cache
We present a technique, called CFAR, that developers can use to reason precisely about
how their code, as well as third-party code, uses the CPU cache. Given a piece of systems …
how their code, as well as third-party code, uses the CPU cache. Given a piece of systems …
Blocking Tracking JavaScript at the Function Granularity
Modern websites extensively rely on JavaScript to implement both functionality and tracking.
Existing privacy-enhancing content-blocking tools struggle against mixed scripts, which …
Existing privacy-enhancing content-blocking tools struggle against mixed scripts, which …
Mobidroid: A performance-sensitive malware detection system on mobile platform
Currently, Android malware detection is mostly performed on the server side against the
increasing number of Android malware. Powerful computing resource gives more …
increasing number of Android malware. Powerful computing resource gives more …
HotFuzz: Discovering algorithmic denial-of-service vulnerabilities through guided micro-fuzzing
Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities
that allow adversaries to achieve either remote code execution or information disclosure …
that allow adversaries to achieve either remote code execution or information disclosure …
VeriAbs: Verification by abstraction and test generation
M Afzal, A Asia, A Chauhan… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Verification of programs continues to be a challenge and no single known technique
succeeds on all programs. In this paper we present VeriAbs, a reachability verifier for C …
succeeds on all programs. In this paper we present VeriAbs, a reachability verifier for C …
Pyse: Automatic worst-case test generation by reinforcement learning
Stress testing is an important task in software testing, which examines the behavior of a
program under a heavy load. Symbolic execution is a useful tool to find out the worst-case …
program under a heavy load. Symbolic execution is a useful tool to find out the worst-case …
Generation of Violation Witnesses by Under-Approximating Abstract Interpretation
This works studies abstract backward semantics to infer sufficient program preconditions,
based on an idea first proposed in previous work. This analysis exploits under-approximated …
based on an idea first proposed in previous work. This analysis exploits under-approximated …