A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

[HTML][HTML] Attacks and defences on intelligent connected vehicles: A survey

M Dibaei, X Zheng, K Jiang, R Abbas, S Liu… - Digital Communications …, 2020 - Elsevier
Intelligent vehicles are advancing at a fast speed with the improvement of automation and
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …

Neuzz: Efficient fuzzing with neural program smoothing

D She, K Pei, D Epstein, J Yang… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Fuzzing has become the de facto standard technique for finding software vulnerabilities.
However, even state-of-the-art fuzzers are not very efficient at finding hard-to-trigger …

An orchestrated survey of methodologies for automated software test case generation

S Anand, EK Burke, TY Chen, J Clark… - Journal of systems and …, 2013 - Elsevier
Test case generation is among the most labour-intensive tasks in software testing. It also has
a strong impact on the effectiveness and efficiency of software testing. For these reasons, it …

[PDF][PDF] Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.

C Cadar, D Dunbar, DR Engler - OSDI, 2008 - usenix.org
We present a new symbolic execution tool, KLEE, capable of automatically generating tests
that achieve high coverage on a diverse set of complex and environmentally-intensive …

CUTE: A concolic unit testing engine for C

K Sen, D Marinov, G Agha - ACM SIGSOFT software engineering notes, 2005 - dl.acm.org
In unit testing, a program is decomposed into units which are collections of functions. A part
of unit can be tested by generating inputs for a single entry function. The entry function may …

{Under-Constrained} symbolic execution: Correctness checking for real code

DA Ramos, D Engler - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …

A {NICE} way to test {OpenFlow} applications

M Canini, D Venzano, P Perešíni, D Kostić… - 9th USENIX Symposium …, 2012 - usenix.org
The emergence of OpenFlow-capable switches enables exciting new network functionality,
at the risk of programming errors that make communication less reliable. The centralized …

EXE: Automatically generating inputs of death

C Cadar, V Ganesh, PM Pawlowski, DL Dill… - ACM Transactions on …, 2008 - dl.acm.org
This article presents EXE, an effective bug-finding tool that automatically generates inputs
that crash real code. Instead of running code on manually or randomly constructed input …

[หนังสือ][B] Decision procedures

D Kroening, O Strichman - 2008 - Springer
A decision procedure is an algorithm that, given a decision problem, terminates with a
correct yes/no answer. In this book, we focus on decision procedures for decidable first …