Synthesizing highly expressive SQL queries from input-output examples

C Wang, A Cheung, R Bodik - Proceedings of the 38th ACM SIGPLAN …, 2017 - dl.acm.org
SQL is the de facto language for manipulating relational data. Though powerful, many users
find it difficult to write SQL queries due to highly expressive constructs. While using the …

Satisfiability modulo theories

C Barrett, C Tinelli - Handbook of model checking, 2018 - Springer
Abstract Satisfiability Modulo Theories (SMT) refers to the problem of determining whether a
first-order formula is satisfiable with respect to some logical theory. Solvers based on SMT …

A survey on string constraint solving

R Amadini - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
String constraint solving refers to solving combinatorial problems involving constraints over
string variables. String solving approaches have become popular over the past few years …

A symbolic execution framework for javascript

P Saxena, D Akhawe, S Hanna, F Mao… - … IEEE Symposium on …, 2010 - ieeexplore.ieee.org
As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly
complex. However, few automated vulnerability analysis tools for JavaScript exist. In this …

Composite constant propagation: Application to android inter-component communication analysis

D Octeau, D Luchaup, M Dering, S Jha… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Many program analyses require statically inferring the possible values of composite types.
However, current approaches either do not account for correlations between object fields or …

Automatic creation of SQL injection and cross-site scripting attacks

A Kieyzun, PJ Guo, K Jayaraman… - 2009 IEEE 31st …, 2009 - ieeexplore.ieee.org
We present a technique for finding security vulnerabilities in Web applications. SQL Injection
(SQLI) and cross-site scripting (XSS) attacks are widespread forms of attack in which the …

Z3-str: A z3-based string solver for web application analysis

Y Zheng, X Zhang, V Ganesh - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
Analyzing web applications requires reasoning about strings and non-strings cohesively.
Existing string solvers either ignore non-string program behavior or support limited set of …

Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis

CS Păsăreanu, W Visser, D Bushnell… - Automated Software …, 2013 - Springer
Symbolic PathFinder (SPF) is a software analysis tool that combines symbolic execution with
model checking for automated test case generation and error detection in Java bytecode …

S3: A symbolic string solver for vulnerability detection in web applications

MT Trinh, DH Chu, J Jaffar - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
Motivated by the vulnerability analysis of web programs which work on string inputs, we
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …

A DPLL(T) Theory Solver for a Theory of Strings and Regular Expressions

T Liang, A Reynolds, C Tinelli, C Barrett… - … Conference on Computer …, 2014 - Springer
An increasing number of applications in verification and security rely on or could benefit from
automatic solvers that can check the satisfiability of constraints over a rich set of data types …