© 2012 Dr. Trevor Alexander HansenSoftware defects are a curse, they are so difficult to find that most software is declared finished, only later to have defects discovered. Ideally, software tools would find most, or all of those defects for us. Bit-vector and array reasoning is important to the software testing and verification tools which aim to find those defects. The bulk of this dissertation investigates how to build a faster bit-vector and array solver. The usefulness of a bit-vector and array solver depends chiefly on it being correct and efficient. Our work is practical, mostly we evaluate different simplifications that make problems easier to solve. In particular, we perform a bit-vect...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
International audienceSymbolic execution is a classical program testing technique which evaluates a ...
In a computer program, basic functionalities may be implemented using bit-wise operations. To formal...
Despite significant recent advances, the effectiveness of symbolic execution is limited when used to...
Dynamic test generation consists of executing a program while gathering symbolic constraints on inpu...
Abstract. The standard method for deciding bit-vector constraints is via eager reduction to proposit...
International audienceWe address the challenge of developing efficient Constraint Programming-based ...
Bitwise operations are commonly used in low-level systems code to access multiple data fields that h...
Safety-critical systems rely on various forms of machine arithmetic to perform their tasks: integer ...
Symbolic execution is an effective program analysis technique whose scalability largely depends on t...
Improper string manipulations are an important cause of software defects, which make them a target f...
In a computer program, basic functionalities may be implemented using bit-wise operations. This can ...
Although a number of weaknesses of symbolic execution, when used for software testing, have been hig...
Symbolic execution tools query constraint solvers for tasks such as determining the feasibility of p...
We develop an idea originally proposed by Michel and Van Hentenryck of how to perform bit-vector con...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
International audienceSymbolic execution is a classical program testing technique which evaluates a ...
In a computer program, basic functionalities may be implemented using bit-wise operations. To formal...
Despite significant recent advances, the effectiveness of symbolic execution is limited when used to...
Dynamic test generation consists of executing a program while gathering symbolic constraints on inpu...
Abstract. The standard method for deciding bit-vector constraints is via eager reduction to proposit...
International audienceWe address the challenge of developing efficient Constraint Programming-based ...
Bitwise operations are commonly used in low-level systems code to access multiple data fields that h...
Safety-critical systems rely on various forms of machine arithmetic to perform their tasks: integer ...
Symbolic execution is an effective program analysis technique whose scalability largely depends on t...
Improper string manipulations are an important cause of software defects, which make them a target f...
In a computer program, basic functionalities may be implemented using bit-wise operations. This can ...
Although a number of weaknesses of symbolic execution, when used for software testing, have been hig...
Symbolic execution tools query constraint solvers for tasks such as determining the feasibility of p...
We develop an idea originally proposed by Michel and Van Hentenryck of how to perform bit-vector con...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
International audienceSymbolic execution is a classical program testing technique which evaluates a ...
In a computer program, basic functionalities may be implemented using bit-wise operations. To formal...