A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Leopard: Identifying vulnerable code for vulnerability assessment through program metrics

X Du, B Chen, Y Li, J Guo, Y Zhou… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective
vulnerability assessment; ie, it can greatly help security experts put their time and effort to …

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection

Y Li, Y Xue, H Chen, X Wu, C Zhang, X **e… - Proceedings of the …, 2019 - dl.acm.org
Existing greybox fuzzers mainly utilize program coverage as the goal to guide the fuzzing
process. To maximize their outputs, coverage-based greybox fuzzers need to evaluate the …

Automatically Reasoning About How Systems Code Uses the {CPU} Cache

R Iyer, K Argyraki, G Candea - 18th USENIX Symposium on Operating …, 2024 - usenix.org
We present a technique, called CFAR, that developers can use to reason precisely about
how their code, as well as third-party code, uses the CPU cache. Given a piece of systems …

Blocking Tracking JavaScript at the Function Granularity

AH Amjad, S Munir, Z Shafiq, MA Gulzar - … of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Modern websites extensively rely on JavaScript to implement both functionality and tracking.
Existing privacy-enhancing content-blocking tools struggle against mixed scripts, which …

Mobidroid: A performance-sensitive malware detection system on mobile platform

R Feng, S Chen, X **e, L Ma, G Meng… - … on Engineering of …, 2019 - ieeexplore.ieee.org
Currently, Android malware detection is mostly performed on the server side against the
increasing number of Android malware. Powerful computing resource gives more …

HotFuzz: Discovering algorithmic denial-of-service vulnerabilities through guided micro-fuzzing

W Blair, A Mambretti, S Arshad, M Weissbacher… - arxiv preprint arxiv …, 2020 - arxiv.org
Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities
that allow adversaries to achieve either remote code execution or information disclosure …

VeriAbs: Verification by abstraction and test generation

M Afzal, A Asia, A Chauhan… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Verification of programs continues to be a challenge and no single known technique
succeeds on all programs. In this paper we present VeriAbs, a reachability verifier for C …

Pyse: Automatic worst-case test generation by reinforcement learning

J Koo, C Saumya, M Kulkarni… - 2019 12th IEEE …, 2019 - ieeexplore.ieee.org
Stress testing is an important task in software testing, which examines the behavior of a
program under a heavy load. Symbolic execution is a useful tool to find out the worst-case …

Generation of Violation Witnesses by Under-Approximating Abstract Interpretation

M Milanese, A Miné - … Conference on Verification, Model Checking, and …, 2023 - Springer
This works studies abstract backward semantics to infer sufficient program preconditions,
based on an idea first proposed in previous work. This analysis exploits under-approximated …