A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Deductive software verification-the key book

W Ahrendt, B Beckert, R Bubel, R Hähnle… - Lecture notes in …, 2016 - Springer
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …

Deductive software verification: from pen-and-paper proofs to industrial tools

R Hähnle, M Huisman - Computing and Software Science: State of the Art …, 2019 - Springer
Deductive software verification aims at formally verifying that all possible behaviors of a
given program satisfy formally defined, possibly complex properties, where the verification …

The KeY platform for verification and analysis of Java programs

W Ahrendt, B Beckert, D Bruns, R Bubel… - … : Theories, Tools and …, 2014 - Springer
The KeY system offers a platform of software analysis tools for sequential Java. Foremost,
this includes full functional verification against contracts written in the Java Modeling …

Relational symbolic execution

GP Farina, S Chong, M Gaboardi - Proceedings of the 21st International …, 2019 - dl.acm.org
Symbolic execution is a classical program analysis technique used to show that programs
satisfy or violate given specifications. In this work we generalize symbolic execution to …

The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more

M Hentschel, R Bubel, R Hähnle - International Journal on Software Tools …, 2019 - Springer
Abstract The Symbolic Execution Debugger (SED), is an extension of the debug platform for
interactive debuggers based on symbolic execution. The SED comes with a static symbolic …

Data minimisation: a language-based approach

T Antignac, D Sands, G Schneider - … on ICT Systems Security and Privacy …, 2017 - Springer
Data minimisation is a privacy-enhancing principle considered as one of the pillars of
personal data regulations. This principle dictates that personal data collected should be no …

New directions for container debloating

V Rastogi, C Niddodi, S Mohan, S Jha - Proceedings of the 2017 …, 2017 - dl.acm.org
Application containers, such as Docker containers, are light-weight virtualization
environments that" contain" applications together with their resources and configuration …

3D visualization of symbolic execution traces

J Zielasko, S Tempel, V Herdt… - 2022 Forum on …, 2022 - ieeexplore.ieee.org
Symbolic execution is a powerful software testing technique for finding bugs in complex
software. Unfortunately, following the symbolic execution and understanding its results is …

The interactive verification debugger: Effective understanding of interactive proof attempts

M Hentschel, R Hähnle, R Bubel - Proceedings of the 31st IEEE/ACM …, 2016 - dl.acm.org
The Symbolic Execution Debugger (SED) is an extension of the Eclipse debug platform for
interactive symbolic execution. Like a traditional debugger, the SED can be used to locate …