A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

Is your code generated by chatgpt really correct? rigorous evaluation of large language models for code generation

J Liu, CS Xia, Y Wang, L Zhang - Advances in Neural …, 2024 - proceedings.neurips.cc
Program synthesis has been long studied with recent approaches focused on directly using
the power of Large Language Models (LLMs) to generate code. Programming benchmarks …

{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing

I Yun, S Lee, M Xu, Y Jang, T Kim - 27th USENIX Security Symposium …, 2018 - usenix.org
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and
concolic execution by combining both approaches. The hybrid approach has shown its …

[PDF][PDF] VUzzer: Application-aware Evolutionary Fuzzing.

S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida… - NDSS, 2017 - research.vu.nl
Fuzzing is an effective software testing technique to find bugs. Given the size and complexity
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …

Beacon: Directed grey-box fuzzing with provable path pruning

H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …

Symbolic execution for software testing: three decades later

C Cadar, K Sen - Communications of the ACM, 2013 - dl.acm.org
Symbolic execution for software testing Page 1 82 communicaTionS of The acm | february
2013 | vol. 56 | no. 2 review articles ill us tra tion b y marius w a tz sYMBoliC eXeCUtioN has …

An orchestrated survey of methodologies for automated software test case generation

S Anand, EK Burke, TY Chen, J Clark… - Journal of systems and …, 2013 - Elsevier
Test case generation is among the most labour-intensive tasks in software testing. It also has
a strong impact on the effectiveness and efficiency of software testing. For these reasons, it …

Dynodroid: An input generation system for android apps

A Machiry, R Tahiliani, M Naik - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
We present a system Dynodroid for generating relevant inputs to unmodified Android apps.
Dynodroid views an app as an event-driven program that interacts with its environment by …

Unleashing mayhem on binary code

SK Cha, T Avgerinos, A Rebert… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
In this paper we present Mayhem, a new system for automatically finding exploitable bugs in
binary (ie, executable) programs. Every bug reported by Mayhem is accompanied by a …