Under-Constrained Symbolic Execution: Correctness Checking for Real Code
暂无分享,去创建一个
[1] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[2] P. T. Barry,et al. Abstract syntax notation-one (ASN.1) , 1992 .
[3] Matthias Hauswirth,et al. Low-overhead memory leak detection using adaptive statistical profiling , 2004, ASPLOS XI.
[4] Zhenkai Liang,et al. Test generation to expose changes in evolving programs , 2010, ASE '10.
[5] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[6] Karl N. Levitt,et al. SELECT—a formal system for testing and debugging programs by symbolic execution , 1975 .
[7] Corina S. Pasareanu,et al. Symbolic PathFinder: symbolic execution of Java bytecode , 2010, ASE.
[8] Shuvendu K. Lahiri,et al. Differential assertion checking , 2013, ESEC/FSE 2013.
[9] Alexander Aiken,et al. Scalable error detection using boolean satisfiability , 2005, POPL '05.
[10] Matthew B. Dwyer,et al. Differential symbolic execution , 2008, SIGSOFT '08/FSE-16.
[11] Eran Yahav,et al. Abstract Semantic Differencing for Numerical Programs , 2013, SAS.
[12] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[13] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[14] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[15] Cristian Cadar,et al. High-Coverage Symbolic Patch Testing , 2012, SPIN.
[16] Sarfraz Khurshid,et al. Generalized Symbolic Execution for Model Checking and Testing , 2003, TACAS.
[17] Shuvendu K. Lahiri,et al. SYMDIFF: A Language-Agnostic Semantic Diff Tool for Imperative Programs , 2012, CAV.
[18] Ofer Strichman,et al. Regression Verification: Proving the Equivalence of Similar Programs , 2009, CAV.
[19] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[20] Alexander Aiken,et al. Context- and path-sensitive memory leak detection , 2005, ESEC/FSE-13.
[21] Ofer Strichman,et al. Regression verification: proving the equivalence of similar programs , 2013, Softw. Test. Verification Reliab..
[22] Sarfraz Khurshid,et al. Directed incremental symbolic execution , 2011, PLDI '11.
[23] Dawson R. Engler,et al. Under-constrained execution: making automatic code destruction easy and scalable , 2007, ISSTA '07.
[24] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[25] Jooyong Yi,et al. Bogor/Kiasan: A k-bounded Symbolic Execution for Checking Strong Heap Properties of Open Systems , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).
[26] Suzette Person,et al. Regression Verification Using Impact Summaries , 2013, SPIN.
[27] Cristian Cadar,et al. KATCH: high-coverage testing of software patches , 2013, ESEC/FSE 2013.
[28] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, SIGP.
[29] Junfeng Yang,et al. Verifying systems rules using rule-directed symbolic execution , 2013, ASPLOS '13.
[30] Dawson R. Engler,et al. Practical, Low-Effort Equivalence Verification of Real Code , 2011, CAV.
[31] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[32] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.
[33] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.