Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of symbolic execution techniques
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
An empirical evaluation of using large language models for automated unit test generation
Unit tests play a key role in ensuring the correctness of software. However, manually
creating unit tests is a laborious task, motivating the need for automation. Large Language …
creating unit tests is a laborious task, motivating the need for automation. Large Language …
{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and
concolic execution by combining both approaches. The hybrid approach has shown its …
concolic execution by combining both approaches. The hybrid approach has shown its …
Vuzzer: Application-aware evolutionary fuzzing
Fuzzing is an effective software testing technique to find bugs. Given the size and complexity
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …
Sok:(state of) the art of war: Offensive techniques in binary analysis
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …
level, semantically rich information about data structures and control constructs makes the …
[PDF][PDF] Driller: Augmenting fuzzing through selective symbolic execution.
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can
exploit to obtain unauthorized access to confidential information. As products with access to …
exploit to obtain unauthorized access to confidential information. As products with access to …
Learning to fuzz from symbolic execution with application to smart contracts
Fuzzing and symbolic execution are two complementary techniques for discovering software
vulnerabilities. Fuzzing is fast and scalable, but can be ineffective when it fails to randomly …
vulnerabilities. Fuzzing is fast and scalable, but can be ineffective when it fails to randomly …
Symbolic execution with {SymCC}: Don't interpret, compile!
A major impediment to practical symbolic execution is speed, especially when compared to
near-native speed solutions like fuzz testing. We propose a compilation-based approach to …
near-native speed solutions like fuzz testing. We propose a compilation-based approach to …
The oracle problem in software testing: A survey
Testing involves examining the behaviour of a system in order to discover potential faults.
Given an input for a system, the challenge of distinguishing the corresponding desired …
Given an input for a system, the challenge of distinguishing the corresponding desired …