Recovering fitness gradients for interprocedural Boolean flags in search-based testing

Y Lin, J Sun, G Fraser, Z Xiu, T Liu… - Proceedings of the 29th …, 2020 - dl.acm.org
In Search-based Software Testing (SBST), test generation is guided by fitness functions that
estimate how close a test case is to reach an uncovered test goal (eg, branch). A popular …

Automatic loop summarization via path dependency analysis

X Xie, B Chen, L Zou, Y Liu, W Le… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Analyzing loops is very important for various software engineering tasks such as bug
detection, test case generation and program optimization. However, loops are very …

Large-scale analysis of non-termination bugs in real-world oss projects

X Shi, X Xie, Y Li, Y Zhang, S Chen, X Li - Proceedings of the 30th ACM …, 2022 - dl.acm.org
Termination is a crucial program property. Non-termination bugs can be subtle to detect and
may remain hidden for long before they take effect. Many real-world programs still suffer …

AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices

M Salehi, K Pattabiraman - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Real-time embedded devices like medical or industrial devices are increasingly targeted by
cyber-attacks. Prompt patching is crucial to mitigate the serious consequences of such …

EndWatch: A practical method for detecting non-termination in real-world software

Y Zhang, X Xie, Y Li, S Chen… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Detecting non-termination is crucial for ensuring program correctness and security, such as
preventing denial-of-service attacks. While termination analysis has been studied for many …

GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning

MS Anwar, C Yagemann, Z Lin - 2025 IEEE Symposium on Security …, 2024 - computer.org
As the global community advocates for the adoption of memory-safe programming
languages, a significant research gap persists in identifying the critical vulnerabilities that …

Syndicate: Synergistic Synthesis of Ranking Function and Invariants for Termination Analysis

Y Sarita, A Singh, S Gomber, G Singh… - arXiv preprint arXiv …, 2024 - arxiv.org
Several techniques have been developed to prove the termination of programs. Finding
ranking functions is one of the common approaches to do so. A ranking function must be …

Discovering Properties about Arrays via Path Dependence Analysis

Q Zhang, Y Zhang, X Li, B Wu - 2021 International Symposium …, 2021 - ieeexplore.ieee.org
Array, as a fundamental data structure, is widely used in programs. Automated reasoning
about arrays needs to discover properties about ranges of elements at certain program …

Semantic driven vulnerability detection and patch analysis

Z Xu - 2021 - dr.ntu.edu.sg
Software vulnerability has become a major threat to software security. Works have been
proposed to search for vulnerabilities in both source code and binary programs. Code clone …

[PDF][PDF] Static loop summarization and its application

C Wang - wcphkust.github.io
Loops are commonly-used control structures in real-world programs and make it convenient
for programmers to implement complex functionalities of program. However, the incorrect …