K Alshmrany, M Aldughaim, A Bhayat… - Formal Aspects of …, 2024 - dl.acm.org
Bounded model checking (BMC) and fuzzing techniques are among the most effective methods for detecting errors and security vulnerabilities in software. However, there are still …
Q Hu, W Chen, Z Wang, S Lu, Y Nie, X Li, X Kuang - Electronics, 2023 - mdpi.com
Hybrid fuzzing is an automated software testing approach that synchronizes test cases between the fuzzer and the concolic executor to improve performance. The concolic …
Hybrid fuzzing combines fuzzing and concolic execution which leverages the high- throughput feature of fuzzing to explore easy-to-reach code, and the powerful constraint …
Developing secure and bug-free software is an extraordinarily challenging task. Due to the devastating effects vulnerabilities may have on financial, security, or an individual's well …
X Kong, Y Tang, P Wang, S Wei… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Mutation-based taint inference (MTI) is a novel technique for taint analysis. Compared with traditional techniques that track propagations of taint tags, MTI infers a variable is tainted if …
Testing, both static and dynamic, is a critical activity for detecting defects and ensuring software compliance according to a specification. One way to describe software …