This paper introduces a new property called robust reachability which refines the standard notion of reachability in order to take replicability into account. A bug is robustly reachable if a controlled input can make it so the bug is reached whatever the value of uncontrolled input. Robust reachability is better suited than standard reachability in many realistic situations related to security (e.g., criticality assessment or bug prioritization) or software engineering (e.g., replicable test suites and flakiness). We propose a formal treatment of the concept, and we revisit existing symbolic bug finding methods through this new lens. Remarkably, robust reachability allows differentiating bounded model checking from symbolic execution while...
Modern software model checkers find safety violations: breaches where the system enters some bad sta...
Modern software model checkers find safety violations: breaches where the system has entered some ba...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
International audienceWe introduce a new property called robust reachability which refines the stand...
Many software analysis techniques attempt to determine whether bugs are reachable, but for security ...
Modern bug-finding techniques have become effective enough that the bottleneck is not finding bugs b...
<p>Characterization of bugs and attack vectors is in many practical scenarios as important as ...
Software inevitably contains mistakes and operates incorrectly in at least some situations. As a res...
Over the past 20 years, our society has become increasingly dependent on software. Today, we rely on...
Abstract---This paper presents a game theoretic approach to fault detection of reachability testing....
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Security bugs in network-based applications allow an attacker to compromise a system from the networ...
Bug traces produced in simulation serve as the basis for patching the RTL code in order to fix a bug...
Modern software model checkers find safety violations: breaches where the system enters some bad sta...
Modern software model checkers find safety violations: breaches where the system has entered some ba...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
International audienceWe introduce a new property called robust reachability which refines the stand...
Many software analysis techniques attempt to determine whether bugs are reachable, but for security ...
Modern bug-finding techniques have become effective enough that the bottleneck is not finding bugs b...
<p>Characterization of bugs and attack vectors is in many practical scenarios as important as ...
Software inevitably contains mistakes and operates incorrectly in at least some situations. As a res...
Over the past 20 years, our society has become increasingly dependent on software. Today, we rely on...
Abstract---This paper presents a game theoretic approach to fault detection of reachability testing....
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Security bugs in network-based applications allow an attacker to compromise a system from the networ...
Bug traces produced in simulation serve as the basis for patching the RTL code in order to fix a bug...
Modern software model checkers find safety violations: breaches where the system enters some bad sta...
Modern software model checkers find safety violations: breaches where the system has entered some ba...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...