{Under-Constrained} symbolic execution: Correctness checking for real code

DA Ramos, D Engler - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …

{MoonShine}: Optimizing {OS} fuzzer seed selection with trace distillation

S Pailoor, A Aday, S Jana - 27th USENIX Security Symposium (USENIX …, 2018 - usenix.org
OS fuzzers primarily test the system call interface between the OS kernel and user-level
applications for security vulnerabilities. The effectiveness of evolutionary OS fuzzers …

Security testing: A survey

M Felderer, M Büchler, M Johns, AD Brucker… - Advances in …, 2016 - Elsevier
Identifying vulnerabilities and ensuring security functionality by security testing is a widely
applied measure to evaluate and improve the security of software. Due to the openness of …

Time-travel testing of android apps

Z Dong, M Böhme, L Cojocaru… - Proceedings of the ACM …, 2020 - dl.acm.org
Android testing tools generate sequences of input events to exercise the state space of the
app-under-test. Existing search-based techniques systematically evolve a population of …

Ldx: Causality inference by lightweight dual execution

Y Kwon, D Kim, WN Sumner, K Kim… - Proceedings of the …, 2016 - dl.acm.org
Causality inference, such as dynamic taint anslysis, has many applications (eg, information
leak detection). It determines whether an event e is causally dependent on a preceding …

10 years of research on debugging concurrent and multicore software: A systematic mapping study

S Abbaspour Asadollah, D Sundmark, S Eldh… - Software quality …, 2017 - Springer
Debugging—the process of identifying, localizing and fixing bugs—is a key activity in
software development. Due to issues such as non-determinism and difficulties of …

Synapse: a microservices architecture for heterogeneous-database web applications

N Viennot, M Lécuyer, J Bell, R Geambasu… - Proceedings of the tenth …, 2015 - dl.acm.org
The growing demand for data-driven features in today's Web applications--such as targeting,
recommendations, or predictions--has transformed those applications into complex …

A systematic classification of security regression testing approaches

M Felderer, E Fourneret - International Journal on Software Tools for …, 2015 - Springer
The openness of modern IT systems and their permanent change make it challenging to
keep these systems secure. A combination of regression and security testing called security …

Revelio: Ml-generated debugging queries for finding root causes in distributed systems

P Dogga, K Narasimhan, A Sivaraman… - Proceedings of …, 2022 - proceedings.mlsys.org
A major difficulty in debugging distributed systems lies in manually determining which of the
many available debugging tools to use and how to query that tool's logs. Our own study of a …

iThreads: A threading library for parallel incremental computation

P Bhatotia, P Fonseca, UA Acar… - Proceedings of the …, 2015 - dl.acm.org
Incremental computation strives for efficient successive runs of applications by re-executing
only those parts of the computation that are affected by a given input change instead of …