" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Acetest: Automated constraint extraction for testing deep learning operators

J Shi, Y Xiao, Y Li, Y Li, D Yu, C Yu, H Su… - Proceedings of the …, 2023 - dl.acm.org
Deep learning (DL) applications are prevalent nowadays as they can help with multiple
tasks. DL libraries are essential for building DL applications. Furthermore, DL operators are …

Eunomia: enabling user-specified fine-grained search in symbolically executing WebAssembly binaries

N He, Z Zhao, J Wang, Y Hu, S Guo, H Wang… - Proceedings of the …, 2023 - dl.acm.org
Although existing techniques have proposed automated approaches to alleviate the path
explosion problem of symbolic execution, users still need to optimize symbolic execution by …

Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction

H Wang, Z Tang, SH Tan, J Wang, Y Liu… - Proceedings of the …, 2024 - dl.acm.org
Deep learning (DL) has emerged as a viable means for identifying software bugs and
vulnerabilities. The success of DL relies on having a suitable representation of the problem …

Sibyl: improving software engineering tools with SMT selection

W Leeson, MB Dwyer, A Filieri - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
SMT solvers are often used in the back end of different software engineering tools─ eg,
program verifiers, test generators, or program synthesizers. There are a plethora of …

Automatic detection of infeasible paths in large-scale program based on program summaries

Y Dong, S Wang, L Zhang, X Liu, S Liu - Science of Computer …, 2025 - Elsevier
The existence of infeasible paths in a program reduces the coverage of test cases and
causes a waste of valuable testing resources. Detecting infeasible paths allows for focusing …

Boosting symbolic execution for heap-based vulnerability detection and exploit generation

H Tu - 2023 IEEE/ACM 45th International Conference on …, 2023 - ieeexplore.ieee.org
Heap-based vulnerabilities such as buffer overflow and use after free are severe flaws in
various software systems. Detecting heap-based vulnerabilities and demonstrating their …

Compatible Branch Coverage Driven Symbolic Execution for Efficient Bug Finding

Q Yi, Y Yu, G Yang - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
Symbolic execution is a powerful technique for bug finding by generating test inputs to
systematically explore all feasible paths within a given threshold. However, its practical …

Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution

Y Sun, Z Li, S Lv, L Sun - IEEE Transactions on Dependable …, 2022 - ieeexplore.ieee.org
Industrial Control System (ICS) protocols have built a tight coupling between ICS
components, including industrial software and field controllers such as Programmable Logic …

Concretely Mapped Symbolic Memory Locations for Memory Error Detection

H Tu, L Jiang, J Hong, X Ding… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Memory allocation is a fundamental operation for managing memory objects in many
programming languages. Misusing allocated memory objects (eg, buffer overflow and use …