Manticore: A user-friendly symbolic execution framework for binaries and smart contracts

M Mossberg, F Manzano, E Hennenfent… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
An effective way to maximize code coverage in software tests is through dynamic symbolic
execution-a technique that uses constraint solving to systematically explore a program's …

SafeDrop: Detecting memory deallocation bugs of rust programs via static data-flow analysis

M Cui, C Chen, H Xu, Y Zhou - ACM Transactions on Software …, 2023 - dl.acm.org
Rust is an emerging programming language that aims to prevent memory-safety bugs.
However, the current design of Rust also brings side effects, which may increase the risk of …

Bigfuzz: Efficient fuzz testing for data analytics using framework abstraction

Q Zhang, J Wang, MA Gulzar, R Padhye… - Proceedings of the 35th …, 2020 - dl.acm.org
As big data analytics become increasingly popular, data-intensive scalable computing
(DISC) systems help address the scalability issue of handling large data. However …

Eunomia: enabling user-specified fine-grained search in symbolically executing WebAssembly binaries

N He, Z Zhao, J Wang, Y Hu, S Guo, H Wang… - Proceedings of the …, 2023 - dl.acm.org
Although existing techniques have proposed automated approaches to alleviate the path
explosion problem of symbolic execution, users still need to optimize symbolic execution by …

Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation

Z Jiang, M Wen, J Cao, X Shi, H ** - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
Automatic testing has garnered significant attention and success over the past few decades.
Techniques such as unit testing and coverage-guided fuzzing have revealed numerous …

Systematic comparison of symbolic execution systems: intermediate representation and its generation

S Poeplau, A Francillon - Proceedings of the 35th Annual Computer …, 2019 - dl.acm.org
Symbolic execution has become a popular technique for software testing and vulnerability
detection. Most implementations transform the program under analysis to some intermediate …

Automated generation of security-centric descriptions for smart contract bytecode

Y Pan, Z Xu, LT Li, Y Yang, M Zhang - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Smart contract and DApp users are taking great risks, as they do not obtain necessary
knowledge that can help them avoid using vulnera-ble and malicious contract code. In this …

PerfGen: Automated Performance Benchmark Generation for Big Data Analytics

J Wang, J Teoh, MA Gulza, Q Zhang, M Kim - arxiv preprint arxiv …, 2024 - arxiv.org
Many symptoms of poor performance in big data analytics such as computational skews,
data skews, and memory skews are input dependent. However, due to the lack of inputs that …

Boosting symbolic execution via constraint solving time prediction (experience paper)

S Luo, H Xu, Y Bi, X Wang, Y Zhou - Proceedings of the 30th ACM …, 2021 - dl.acm.org
Symbolic execution is an essential approach for automated test case generation. However,
the approach is generally not scalable to large programs. One critical reason is that the …

In-Depth Investigation of Artificial Intelligence-Blockchain Integration Strategies for Security Enhancement

CR Jothy, JE Judith - 2024 7th International Conference on …, 2024 - ieeexplore.ieee.org
Blockchain being a distributed ledger preserves data in a highly secured environment which
cannot be modified even by the user who created the data. This security aspect makes the …