Parikh's Theorem Made Symbolic

M Hague, A Jeż, AW Lin - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
Parikh's Theorem is a fundamental result in automata theory with numerous applications in
computer science. These include software verification (eg infinite-state verification, string …

Enhancing symbolic execution of heap-based programs with separation logic for test input generation

LH Pham, QL Le, QS Phan, J Sun, S Qin - Automated Technology for …, 2019 - Springer
Symbolic execution is a well established method for test input generation. Despite of having
achieved tremendous success over numerical domains, existing symbolic execution …

Compositional satisfiability solving in separation logic

QL Le - … , Model Checking, and Abstract Interpretation: 22nd …, 2021 - Springer
We introduce a novel decision procedure to the satisfiability problem in array separation
logic combined with general inductively defined predicates and arithmetic. Our proposal …

Concolic testing heap-manipulating programs

LH Pham, QL Le, QS Phan, J Sun - Formal Methods–The Next 30 Years …, 2019 - Springer
Concolic testing is a test generation technique which works effectively by integrating random
testing generation and symbolic execution. Existing concolic testing engines focus on …

Java reflection API: revealing the dark side of the mirror

F Pontes, R Gheyi, S Souto, A Garcia… - Proceedings of the 2019 …, 2019 - dl.acm.org
Developers of widely used Java Virtual Machines (JVMs) implement and test the Java
Reflection API based on a Javadoc, which is specified using a natural language. However …

S2TD: A separation logic verifier that supports reasoning of the absence and presence of bugs

QL Le, J Sun, LH Pham, S Qin - arXiv preprint arXiv:2209.09327, 2022 - arxiv.org
Heap-manipulating programs are known to be challenging to reason about. We present a
novel verifier for heap-manipulating programs called S2TD, which encodes programs …

[HTML][HTML] Fast and efficient address search in System-on-a-Programmable-Chip using binary trees

J Lázaro, U Bidarte, L Muguira, C Cuadrado… - Computers & Electrical …, 2021 - Elsevier
One processing task in Ethernet nodes is to manage Media Access Control (MAC)
addresses: search, insert new, and delete old ones. For this purpose, Content-Addressable …

[PDF][PDF] Automatic data structure repair using separation logic

G Zheng, QL Le, TV Nguyen… - ACM SIGSOFT Software …, 2018 - research.tees.ac.uk
Software systems are often shipped and deployed with both known and unknown bugs. On-
the-fly program repairs, which handle runtime errors and allow programs to continue …

Compositional verification of heap-manipulating programs through property-guided learning

LH Pham, J Sun, QL Le - … and Systems: 17th Asian Symposium, APLAS …, 2019 - Springer
Analyzing and verifying heap-manipulating programs automatically is challenging. A key for
fighting the complexity is to develop compositional methods. For instance, many existing …

Handling heap data structures in backward symbolic execution

R Husák, J Kofroň, F Zavoral - … Workshops: Porto, Portugal, October 7–11 …, 2020 - Springer
Backward symbolic execution (BSE), also known as weakest precondition computation, is a
useful technique to determine validity of assertions in program code by transforming its …