A survey of symbolic execution techniques
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
Analysis and transformation of constrained Horn clauses for program verification
This paper surveys recent work on applying analysis and transformation techniques that
originate in the field of constraint logic programming (CLP) to the problem of verifying …
originate in the field of constraint logic programming (CLP) to the problem of verifying …
The SeaHorn verification framework
In this paper, we present SeaHorn, a software verification framework. The key distinguishing
feature of SeaHorn is its modular design that separates the concerns of the syntax of the …
feature of SeaHorn is its modular design that separates the concerns of the syntax of the …
Multise: Multi-path symbolic execution using value summaries
Dynamic symbolic execution (DSE) has been proposed to effectively generate test inputs for
real-world programs. Unfortunately, DSE techniques do not scale well for large realistic …
real-world programs. Unfortunately, DSE techniques do not scale well for large realistic …
On solving universally quantified horn clauses
N Bjørner, K McMillan, A Rybalchenko - … 2013, Seattle, WA, USA, June 20 …, 2013 - Springer
Program proving can be viewed as solving for unknown relations (such as loop invariants,
procedure summaries and so on) that occur in the logical verification conditions of a …
procedure summaries and so on) that occur in the logical verification conditions of a …
[PDF][PDF] Advances in Automatic Software Testing: Test-Comp 2022.
D Beyer - FASE, 2022 - library.oapen.org
Test-Comp 2022 is the 4th edition of the Competition on Software Testing. Research
competitions are a means to provide annual comparative evaluations. Test-Comp focusses …
competitions are a means to provide annual comparative evaluations. Test-Comp focusses …
Automatically Reasoning About How Systems Code Uses the {CPU} Cache
We present a technique, called CFAR, that developers can use to reason precisely about
how their code, as well as third-party code, uses the CPU cache. Given a piece of systems …
how their code, as well as third-party code, uses the CPU cache. Given a piece of systems …
[PDF][PDF] Software Testing: 5th Comparative Evaluation: Test-Comp 2023.
D Beyer - FASE, 2023 - library.oapen.org
The 5th edition of the Competition on Software Testing (Test-Comp 2023) provides again an
overview and comparative evaluation of automatic test-suite generators for C programs. The …
overview and comparative evaluation of automatic test-suite generators for C programs. The …
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations
The X. 509 Public-Key Infrastructure has long been used in the SSL/TLS protocol to achieve
authentication. A recent trend of Internet-of-Things (IoT) systems employing small footprint …
authentication. A recent trend of Internet-of-Things (IoT) systems employing small footprint …
Polynomial reachability witnesses via Stellensätze
We consider the fundamental problem of reachability analysis over imperative programs
with real variables. Previous works that tackle reachability are either unable to handle …
with real variables. Previous works that tackle reachability are either unable to handle …