Parikh's Theorem Made Symbolic
Parikh's Theorem is a fundamental result in automata theory with numerous applications in
computer science. These include software verification (eg infinite-state verification, string …
computer science. These include software verification (eg infinite-state verification, string …
Enhancing symbolic execution of heap-based programs with separation logic for test input generation
Symbolic execution is a well established method for test input generation. Despite of having
achieved tremendous success over numerical domains, existing symbolic execution …
achieved tremendous success over numerical domains, existing symbolic execution …
Compositional satisfiability solving in separation logic
QL Le - … , Model Checking, and Abstract Interpretation: 22nd …, 2021 - Springer
We introduce a novel decision procedure to the satisfiability problem in array separation
logic combined with general inductively defined predicates and arithmetic. Our proposal …
logic combined with general inductively defined predicates and arithmetic. Our proposal …
Concolic testing heap-manipulating programs
Concolic testing is a test generation technique which works effectively by integrating random
testing generation and symbolic execution. Existing concolic testing engines focus on …
testing generation and symbolic execution. Existing concolic testing engines focus on …
Java reflection API: revealing the dark side of the mirror
Developers of widely used Java Virtual Machines (JVMs) implement and test the Java
Reflection API based on a Javadoc, which is specified using a natural language. However …
Reflection API based on a Javadoc, which is specified using a natural language. However …
S2TD: A separation logic verifier that supports reasoning of the absence and presence of bugs
Heap-manipulating programs are known to be challenging to reason about. We present a
novel verifier for heap-manipulating programs called S2TD, which encodes programs …
novel verifier for heap-manipulating programs called S2TD, which encodes programs …
[HTML][HTML] Fast and efficient address search in System-on-a-Programmable-Chip using binary trees
One processing task in Ethernet nodes is to manage Media Access Control (MAC)
addresses: search, insert new, and delete old ones. For this purpose, Content-Addressable …
addresses: search, insert new, and delete old ones. For this purpose, Content-Addressable …
[PDF][PDF] Automatic data structure repair using separation logic
Software systems are often shipped and deployed with both known and unknown bugs. On-
the-fly program repairs, which handle runtime errors and allow programs to continue …
the-fly program repairs, which handle runtime errors and allow programs to continue …
Compositional verification of heap-manipulating programs through property-guided learning
Analyzing and verifying heap-manipulating programs automatically is challenging. A key for
fighting the complexity is to develop compositional methods. For instance, many existing …
fighting the complexity is to develop compositional methods. For instance, many existing …
Handling heap data structures in backward symbolic execution
Backward symbolic execution (BSE), also known as weakest precondition computation, is a
useful technique to determine validity of assertions in program code by transforming its …
useful technique to determine validity of assertions in program code by transforming its …