A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Fairfuzz: A targeted mutation strategy for increasing greybox fuzz testing coverage

C Lemieux, K Sen - Proceedings of the 33rd ACM/IEEE international …, 2018 - dl.acm.org
In recent years, fuzz testing has proven itself to be one of the most effective techniques for
finding correctness bugs and security vulnerabilities in practice. One particular fuzz testing …

Verx: Safety verification of smart contracts

A Permenev, D Dimitrov, P Tsankov… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
We present VerX, the first automated verifier able to prove functional properties of Ethereum
smart contracts. VerX addresses an important problem as all real-world contracts must …

Mutation testing advances: an analysis and survey

M Papadakis, M Kintis, J Zhang, Y Jia, Y Le Traon… - Advances in …, 2019 - Elsevier
Mutation testing realizes the idea of using artificial defects to support testing activities.
Mutation is typically used as a way to evaluate the adequacy of test suites, to guide the …

State of the art: Dynamic symbolic execution for automated test generation

T Chen, X Zhang, S Guo, H Li, Y Wu - Future Generation Computer Systems, 2013 - Elsevier
Dynamic symbolic execution for automated test generation consists of instrumenting and
running a program while collecting path constraint on inputs from predicates encountered in …

Symbolic execution for software testing: three decades later

C Cadar, K Sen - Communications of the ACM, 2013 - dl.acm.org
Symbolic execution for software testing Page 1 82 communicaTionS of The acm | february
2013 | vol. 56 | no. 2 review articles ill us tra tion b y marius w a tz sYMBoliC eXeCUtioN has …

Semfix: Program repair via semantic analysis

HDT Nguyen, D Qi, A Roychoudhury… - 2013 35th …, 2013 - ieeexplore.ieee.org
Debugging consumes significant time and effort in any major software development project.
Moreover, even after the root cause of a bug is identified, fixing the bug is non-trivial. Given …

Appintent: Analyzing sensitive data transmission in android for privacy leakage detection

Z Yang, M Yang, Y Zhang, G Gu, P Ning… - Proceedings of the 2013 …, 2013 - dl.acm.org
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …

{Under-Constrained} symbolic execution: Correctness checking for real code

DA Ramos, D Engler - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …

Pex–white box test generation for. net

N Tillmann, J De Halleux - International conference on tests and proofs, 2008 - Springer
Pex automatically produces a small test suite with high code coverage for a. NET program.
To this end, Pex performs a systematic program analysis (using dynamic symbolic …