Automated Detection of Non-termination and NullPointerExceptions for Java Bytecode
Recently, we developed an approach for automated termination proofs of Java Bytecode
(JBC), which is based on constructing and analyzing termination graphs. These graphs …
(JBC), which is based on constructing and analyzing termination graphs. These graphs …
Lightweight, multi-stage, compiler-assisted application specialization
M Alhanahnah, R Jain, V Rastogi… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
Program debloating aims to enhance the performance and reduce the attack surface of
bloated applications. Several techniques have been recently proposed to specialize …
bloated applications. Several techniques have been recently proposed to specialize …
[PDF][PDF] Compositional symbolic execution through program specialization
JM Rojas, CS Pasareanu - BYTECODE'13 (ETAPS), 2013 - costa.fdi.ucm.es
Scalability is a major challenge in symbolic execution. The large number of paths that need
to be explored and the large size of the constraints that must be carried often compromise …
to be explored and the large size of the constraints that must be carried often compromise …
I/O Optimisation and elimination via partial evaluation
CSF Smowton - 2014 - cl.cam.ac.uk
Computer programs commonly repeat work. Short programs go through the same
initialisation sequence each time they are run, and long-running servers may be given a …
initialisation sequence each time they are run, and long-running servers may be given a …
PE-KeY: A partial evaluator for Java programs
We present a prototypical implementation of a partial evaluator for Java programs based on
the verification system KeY. We argue that using a program verifier as technological basis …
the verification system KeY. We argue that using a program verifier as technological basis …
[HTML][HTML] Relational symbolic execution of SQL code for unit testing of database programs
M Marcozzi, W Vanhoof, JL Hainaut - Science of Computer Programming, 2015 - Elsevier
Symbolic execution is a technique enabling the automatic generation of test inputs that
exercise a set of execution paths within a code unit to be tested. If the paths cover a sufficient …
exercise a set of execution paths within a code unit to be tested. If the paths cover a sufficient …
Program transformation based on symbolic execution and deduction
We present a program transformation framework based on symbolic execution and
deduction. Its virtues are:(i) behavior preservation of the transformed program is guaranteed …
deduction. Its virtues are:(i) behavior preservation of the transformed program is guaranteed …
[PDF][PDF] HATS-A Formal Software Product Line Engineering Methodology.
Trust in software is typically achieved via stabilisation efforts over long periods of use.
Adaptation to changing circumstances, however, often requires substantial change of the …
Adaptation to changing circumstances, however, often requires substantial change of the …
Symbolic Analysis for Data Plane Programs Specialization
Programmable network data planes have extended the capabilities of packet processing in
network devices by allowing custom processing pipelines and agnostic packet processing …
network devices by allowing custom processing pipelines and agnostic packet processing …
Towards testing of full-scale SQL applications using relational symbolic execution
M Marcozzi, W Vanhoof, JL Hainaut - Proceedings of the 6th …, 2014 - dl.acm.org
Constraint-based testing is an automatic test case generation approach where the tested
application is transformed into constraints whose solutions are adequate test data. In …
application is transformed into constraints whose solutions are adequate test data. In …