Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Synthesizing highly expressive SQL queries from input-output examples
SQL is the de facto language for manipulating relational data. Though powerful, many users
find it difficult to write SQL queries due to highly expressive constructs. While using the …
find it difficult to write SQL queries due to highly expressive constructs. While using the …
Satisfiability modulo theories
Abstract Satisfiability Modulo Theories (SMT) refers to the problem of determining whether a
first-order formula is satisfiable with respect to some logical theory. Solvers based on SMT …
first-order formula is satisfiable with respect to some logical theory. Solvers based on SMT …
A survey on string constraint solving
R Amadini - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
String constraint solving refers to solving combinatorial problems involving constraints over
string variables. String solving approaches have become popular over the past few years …
string variables. String solving approaches have become popular over the past few years …
A symbolic execution framework for javascript
As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly
complex. However, few automated vulnerability analysis tools for JavaScript exist. In this …
complex. However, few automated vulnerability analysis tools for JavaScript exist. In this …
Composite constant propagation: Application to android inter-component communication analysis
Many program analyses require statically inferring the possible values of composite types.
However, current approaches either do not account for correlations between object fields or …
However, current approaches either do not account for correlations between object fields or …
Automatic creation of SQL injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection
(SQLI) and cross-site scripting (XSS) attacks are widespread forms of attack in which the …
(SQLI) and cross-site scripting (XSS) attacks are widespread forms of attack in which the …
Z3-str: A z3-based string solver for web application analysis
Analyzing web applications requires reasoning about strings and non-strings cohesively.
Existing string solvers either ignore non-string program behavior or support limited set of …
Existing string solvers either ignore non-string program behavior or support limited set of …
Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis
Symbolic PathFinder (SPF) is a software analysis tool that combines symbolic execution with
model checking for automated test case generation and error detection in Java bytecode …
model checking for automated test case generation and error detection in Java bytecode …
S3: A symbolic string solver for vulnerability detection in web applications
Motivated by the vulnerability analysis of web programs which work on string inputs, we
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …
A DPLL(T) Theory Solver for a Theory of Strings and Regular Expressions
An increasing number of applications in verification and security rely on or could benefit from
automatic solvers that can check the satisfiability of constraints over a rich set of data types …
automatic solvers that can check the satisfiability of constraints over a rich set of data types …