Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection

S Cao, X Sun, L Bo, Y Wei, B Li - Information and Software Technology, 2021 - Elsevier
Context: Previous studies have shown that existing deep learning-based approaches can
significantly improve the performance of vulnerability detection. They represent code in …

Savior: Towards bug-driven hybrid testing

Y Chen, P Li, J Xu, S Guo, R Zhou… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Hybrid testing combines fuzz testing and concolic execution. It leverages fuzz testing to test
easy-to-reach code regions and uses concolic execution to explore code blocks guarded by …

Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation

C Cao, L Guan, J Ming, P Liu - … of the 36th Annual Computer Security …, 2020 - dl.acm.org
With the rapid proliferation of IoT devices, our cyberspace is nowadays dominated by
billions of low-cost computing nodes, which are very heterogeneous to each other. Dynamic …

Sfuzz: Slice-based fuzzing for real-time operating systems

L Chen, Q Cai, Z Ma, Y Wang, H Hu, M Shen… - Proceedings of the …, 2022 - dl.acm.org
Real-Time Operating System (RTOS) has become the main category of embedded systems.
It is widely used to support tasks requiring real-time response such as printers and switches …

Adversarial symbolic execution for detecting concurrency-related cache timing leaks

S Guo, M Wu, C Wang - Proceedings of the 2018 26th ACM Joint …, 2018 - dl.acm.org
The timing characteristics of cache, a high-speed storage between the fast CPU and the
slow memory, may reveal sensitive information of a program, thus allowing an adversary to …

Eunomia: enabling user-specified fine-grained search in symbolically executing WebAssembly binaries

N He, Z Zhao, J Wang, Y Hu, S Guo, H Wang… - Proceedings of the …, 2023 - dl.acm.org
Although existing techniques have proposed automated approaches to alleviate the path
explosion problem of symbolic execution, users still need to optimize symbolic execution by …

A systematic review of search strategies in dynamic symbolic execution

A Sabbaghi, MR Keyvanpour - Computer Standards & Interfaces, 2020 - Elsevier
One of the major concerns of dynamic symbolic execution (DSE) based automated test case
generation is its huge search space which restricts its usage for industrial-size program …

[HTML][HTML] Beyond the sandbox: Leveraging symbolic execution for evasive malware classification

V Vouvoutsis, F Casino, C Patsakis - Computers & Security, 2025 - Elsevier
Threat actors continuously update their code to incorporate counter-analysis techniques
designed to evade detection and hinder the blocking of their malware. The first line of …

{LinKRID}: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution

J Liu, L Yi, W Chen, C Song, Z Qian, Q Yi - 31st USENIX Security …, 2022 - usenix.org
Linux kernel employs reference counters, which record the number of references to a shared
kernel object, to track its lifecycle and prevent memory errors like use-after-free. However …

Feedback-driven incremental symbolic execution

Q Yi, G Yang - 2022 IEEE 33rd International Symposium on …, 2022 - ieeexplore.ieee.org
Incremental symbolic execution addresses the scalability problem of symbolic execution by
concentrating on incremental behaviors that are introduced by the changes during program …