{Under-Constrained} symbolic execution: Correctness checking for real code

DA Ramos, D Engler - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …

A generic approach to automatic deobfuscation of executable code

B Yadegari, B Johannesmeyer… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Malicious software are usually obfuscated to avoid detection and resist analysis. When new
malware is encountered, such obfuscations have to be penetrated or removed (" …

The scalable commutativity rule: Designing scalable software for multicore processors

AT Clements, MF Kaashoek, N Zeldovich… - ACM Transactions on …, 2015 - dl.acm.org
What opportunities for multicore scalability are latent in software interfaces, such as system
call APIs? Can scalability challenges and opportunities be identified even before any …

Multise: Multi-path symbolic execution using value summaries

K Sen, G Necula, L Gong, W Choi - Proceedings of the 2015 10th Joint …, 2015 - dl.acm.org
Dynamic symbolic execution (DSE) has been proposed to effectively generate test inputs for
real-world programs. Unfortunately, DSE techniques do not scale well for large realistic …

The risks of coverage-directed test case generation

G Gay, M Staats, M Whalen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A number of structural coverage criteria have been proposed to measure the adequacy of
testing efforts. In the avionics and other critical systems domains, test suites satisfying …

1600 faults in 100 projects: automatically finding faults while achieving high coverage with evosuite

G Fraser, A Arcuri - Empirical software engineering, 2015 - Springer
Automated unit test generation techniques traditionally follow one of two goals: Either they
try to find violations of automated oracles (eg, assertions, contracts, undeclared exceptions) …

Static detection of asymptotic performance bugs in collection traversals

O Olivo, I Dillig, C Lin - Proceedings of the 36th ACM SIGPLAN …, 2015 - dl.acm.org
This paper identifies and formalizes a prevalent class of asymptotic performance bugs called
redundant traversal bugs and presents a novel static analysis for automatically detecting …

Symbolic execution of obfuscated code

B Yadegari, S Debray - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Symbolic and concolic execution find important applications in a number of security-related
program analyses, including analysis of malicious code. However, malicious code tend to …

A model-driven framework for guided design space exploration

Á Hegedüs, Á Horváth, D Varró - Automated Software Engineering, 2015 - Springer
Abstract Design space exploration (DSE) aims at searching through various models
representing different design candidates to support activities like configuration design of …

Challenges and opportunities with concolic testing

R Kannavara, CJ Havlicek, B Chen… - 2015 national …, 2015 - ieeexplore.ieee.org
Although concolic testing is increasingly being explored as a viable software verification
technique, its adoption in mainstream software development and testing in the industry is not …