Runtime verification with predictive semantics

X Zhang, M Leucker, W Dong - … Symposium, NFM 2012, Norfolk, VA, USA …, 2012 - Springer
Runtime verification techniques are used to continuously check whether software execution
satisfies or violates a given correctness property. In this paper, we extend our previous work …

Verifying temporal properties of programs: a parallel approach

B Yu, Z Duan, C Tian, N Zhang - Journal of Parallel and Distributed …, 2018 - Elsevier
Due to the nature in dealing only with observed executions of a real system, runtime
verification is being pursued as a lightweight verification technique. However, the overhead …

Binary-level directed fuzzing for {use-after-free} vulnerabilities

MD Nguyen, S Bardin, R Bonichon, R Groz… - … on Research in Attacks …, 2020 - usenix.org
Directed fuzzing focuses on automatically testing specific parts of the code by taking
advantage of additional information such as (partial) bug stack trace, patches or risky …

Context-bounded model checking of LTL properties for ANSI-C software

J Morse, L Cordeiro, D Nicole, B Fischer - Software Engineering and …, 2011 - Springer
Context-bounded model checking has successfully been used to verify safety properties in
multi-threaded systems automatically, even if they are implemented in low-level …

Pafl: extend fuzzing optimizations of single mode to industrial parallel mode

J Liang, Y Jiang, Y Chen, M Wang, C Zhou… - Proceedings of the 2018 …, 2018 - dl.acm.org
Researchers have proposed many optimizations to improve the efficiency of fuzzing, and
most optimized strategies work very well on their targets when running in single mode with …

Snpsfuzzer: A fast greybox fuzzer for stateful network protocols using snapshots

J Li, S Li, G Sun, T Chen, H Yu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Greybox fuzzing has been widely used in stateless programs and has achieved great
success. However, most state-of-the-art greybox fuzzers have slow speed and shallow state …

Online inference and enforcement of temporal properties

M Gabel, Z Su - Proceedings of the 32nd ACM/IEEE International …, 2010 - dl.acm.org
The interfaces of software components are often paired with specifications or protocols that
prescribe correct and safe usage. An important class of these specifications consists of …

SPFuzz: a hierarchical scheduling framework for stateful network protocol fuzzing

C Song, B Yu, X Zhou, Q Yang - IEEE Access, 2019 - ieeexplore.ieee.org
In recent years, the fuzzing technology is widely used to detect the software vulnerabilities
owing to the coverage improvement in the target program and the easiness of use. However …

Llmif: Augmented large language model for fuzzing iot devices

J Wang, L Yu, X Luo - 2024 IEEE Symposium on Security and Privacy …, 2024 - computer.org
Despite the efficacy of fuzzing in verifying the implementation correctness of IoT protocols,
existing IoT fuzzing approaches grapple with several limitations, including unknown …

Dynamically inferring temporal properties

J Yang, D Evans - Proceedings of the 5th ACM SIGPLAN-SIGSOFT …, 2004 - dl.acm.org
Model checking requires a specification of the target system's desirable properties, some of
which are temporal. Formulating a temporal property of the system based on either its …