{Under-Constrained} symbolic execution: Correctness checking for real code
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
{MoonShine}: Optimizing {OS} fuzzer seed selection with trace distillation
OS fuzzers primarily test the system call interface between the OS kernel and user-level
applications for security vulnerabilities. The effectiveness of evolutionary OS fuzzers …
applications for security vulnerabilities. The effectiveness of evolutionary OS fuzzers …
Security testing: A survey
Identifying vulnerabilities and ensuring security functionality by security testing is a widely
applied measure to evaluate and improve the security of software. Due to the openness of …
applied measure to evaluate and improve the security of software. Due to the openness of …
Time-travel testing of android apps
Android testing tools generate sequences of input events to exercise the state space of the
app-under-test. Existing search-based techniques systematically evolve a population of …
app-under-test. Existing search-based techniques systematically evolve a population of …
Ldx: Causality inference by lightweight dual execution
Causality inference, such as dynamic taint anslysis, has many applications (eg, information
leak detection). It determines whether an event e is causally dependent on a preceding …
leak detection). It determines whether an event e is causally dependent on a preceding …
10 years of research on debugging concurrent and multicore software: A systematic mapping study
Debugging—the process of identifying, localizing and fixing bugs—is a key activity in
software development. Due to issues such as non-determinism and difficulties of …
software development. Due to issues such as non-determinism and difficulties of …
Synapse: a microservices architecture for heterogeneous-database web applications
The growing demand for data-driven features in today's Web applications--such as targeting,
recommendations, or predictions--has transformed those applications into complex …
recommendations, or predictions--has transformed those applications into complex …
A systematic classification of security regression testing approaches
M Felderer, E Fourneret - International Journal on Software Tools for …, 2015 - Springer
The openness of modern IT systems and their permanent change make it challenging to
keep these systems secure. A combination of regression and security testing called security …
keep these systems secure. A combination of regression and security testing called security …
Revelio: Ml-generated debugging queries for finding root causes in distributed systems
A major difficulty in debugging distributed systems lies in manually determining which of the
many available debugging tools to use and how to query that tool's logs. Our own study of a …
many available debugging tools to use and how to query that tool's logs. Our own study of a …
iThreads: A threading library for parallel incremental computation
Incremental computation strives for efficient successive runs of applications by re-executing
only those parts of the computation that are affected by a given input change instead of …
only those parts of the computation that are affected by a given input change instead of …