Context Software transformations occur very frequently in practice. Such transformations are done for various purposes though manual refactoring or automatic transformations. However, in this thesis we focus on transformations that must preserve the functional behavior of the software that is being transformed. For instance, software transformations applied by compiler optimizations or obfuscation transformations must preserve the functional behavior of the software, i.e. the original and the transformed counterpart must yield the same output when given the same input. Symbolic execution has been proposed as a technique which could be used to find whether 2 programs have the same functional behavior [1, 2, 3]. Since it is assumed that symbo...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
Software testing is an expensive and time-consuming process, often involving the manual creation of ...
Conference paper. Checking the semantic equivalence of operations is an important task in software d...
Semantics-preserving program transformations, such as refactorings and optimisations, can have a sig...
Successful software systems tend to be long lived and evolve over time as requirements change and fa...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
The testing approach described here has grown out of migration projects aimed at converting procedur...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embed-ded software is increasingly relying on applic...
In recent years, the use of symbolic analysis in systems for testing and verifying programs has exp...
Refactoring a program without changing the program’s functional behavior is challenging. To prevent ...
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic...
Software bugs are a reality of programming. They can be difficult to identify and resolve, even for...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
Software testing is an expensive and time-consuming process, often involving the manual creation of ...
Conference paper. Checking the semantic equivalence of operations is an important task in software d...
Semantics-preserving program transformations, such as refactorings and optimisations, can have a sig...
Successful software systems tend to be long lived and evolve over time as requirements change and fa...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
The testing approach described here has grown out of migration projects aimed at converting procedur...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic...
Development of energy and performance-efficient embedded software is increasingly relying on applica...
Development of energy and performance-efficient embed-ded software is increasingly relying on applic...
In recent years, the use of symbolic analysis in systems for testing and verifying programs has exp...
Refactoring a program without changing the program’s functional behavior is challenging. To prevent ...
In this idea paper, we propose a novel way for improving the testing of program changes via symbolic...
Software bugs are a reality of programming. They can be difficult to identify and resolve, even for...
Optimizing programs by applying source-to-source transformations is a prevalent practice among progr...
Software testing is an expensive and time-consuming process, often involving the manual creation of ...
Conference paper. Checking the semantic equivalence of operations is an important task in software d...