In this paper, we study the problem of automatically finding program executions that reach a particular target line. This problem arises in many debugging scenarios, e.g., a developer might learn that a failure is possible on a particular line but might not know exactly how to reproduce the failure or even whether it is reproducible. This can happen particularly often for bug reports from static analysis tools, which can produce false positives. We propose two new directed symbolic execution strategies that aim to solve this problem: shortest-distance symbolic execution (SDSE) uses a distance metric in an interprocedural control flow graph to guide symbolic execution toward a particular target; and call-chain-backward symbolic exe...
Symbolic execution is a path-sensitive program analysis technique that aids users with program verif...
Software has become ubiquitous and its impact is still increasing. The more software is created, th...
Systems code must obey many rules, such as "opened files must be closed." One approach to verifying ...
Abstract. In this paper, we study the problem of automatically find-ing program executions that reac...
Symbolic execution is a well established technique for software testing and analysis. However, scala...
Symbolic execution is widely used to detect vulnerabilities in software. The idea is to symbolically...
Symbolic execution is a powerful program analysis technique that systematically explores multiple pr...
Due to software complexity, manual and automatic testing are not enough to guarantee the correct beh...
We present an algorithm for tests generation tools based on symbolic execution. The algorithm is sup...
Targeted inputs are input values for a program that lead to the execution of a user-specified branc...
When symbolic execution is used to analyse real-world applications,it often consumes all available m...
We present a symbolic-execution-based algorithm that for a given program and a given program locatio...
Symbolic execution is one of the most powerful tools in static analysis for finding bugs. In this te...
Symbolic execution is a powerful technique for analyzing program behavior, finding bugs, and generat...
textThe last few years have seen a resurgence of interest in the use of symbolic execution--program ...
Symbolic execution is a path-sensitive program analysis technique that aids users with program verif...
Software has become ubiquitous and its impact is still increasing. The more software is created, th...
Systems code must obey many rules, such as "opened files must be closed." One approach to verifying ...
Abstract. In this paper, we study the problem of automatically find-ing program executions that reac...
Symbolic execution is a well established technique for software testing and analysis. However, scala...
Symbolic execution is widely used to detect vulnerabilities in software. The idea is to symbolically...
Symbolic execution is a powerful program analysis technique that systematically explores multiple pr...
Due to software complexity, manual and automatic testing are not enough to guarantee the correct beh...
We present an algorithm for tests generation tools based on symbolic execution. The algorithm is sup...
Targeted inputs are input values for a program that lead to the execution of a user-specified branc...
When symbolic execution is used to analyse real-world applications,it often consumes all available m...
We present a symbolic-execution-based algorithm that for a given program and a given program locatio...
Symbolic execution is one of the most powerful tools in static analysis for finding bugs. In this te...
Symbolic execution is a powerful technique for analyzing program behavior, finding bugs, and generat...
textThe last few years have seen a resurgence of interest in the use of symbolic execution--program ...
Symbolic execution is a path-sensitive program analysis technique that aids users with program verif...
Software has become ubiquitous and its impact is still increasing. The more software is created, th...
Systems code must obey many rules, such as "opened files must be closed." One approach to verifying ...