Malicious software are usually obfuscated to avoid detection and resist analysis. When new malware is encountered, such obfuscations have to be penetrated or removed (" …
What opportunities for multicore scalability are latent in software interfaces, such as system call APIs? Can scalability challenges and opportunities be identified even before any …
Dynamic symbolic execution (DSE) has been proposed to effectively generate test inputs for real-world programs. Unfortunately, DSE techniques do not scale well for large realistic …
G Gay, M Staats, M Whalen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A number of structural coverage criteria have been proposed to measure the adequacy of testing efforts. In the avionics and other critical systems domains, test suites satisfying …
G Fraser, A Arcuri - Empirical software engineering, 2015 - Springer
Automated unit test generation techniques traditionally follow one of two goals: Either they try to find violations of automated oracles (eg, assertions, contracts, undeclared exceptions) …
O Olivo, I Dillig, C Lin - Proceedings of the 36th ACM SIGPLAN …, 2015 - dl.acm.org
This paper identifies and formalizes a prevalent class of asymptotic performance bugs called redundant traversal bugs and presents a novel static analysis for automatically detecting …
B Yadegari, S Debray - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Symbolic and concolic execution find important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to …
Abstract Design space exploration (DSE) aims at searching through various models representing different design candidates to support activities like configuration design of …
R Kannavara, CJ Havlicek, B Chen… - 2015 national …, 2015 - ieeexplore.ieee.org
Although concolic testing is increasingly being explored as a viable software verification technique, its adoption in mainstream software development and testing in the industry is not …