Testing database engines via query plan guidance

J Ba, M Rigger - 2023 IEEE/ACM 45th International Conference …, 2023 - ieeexplore.ieee.org
Database systems are widely used to store and query data. Test oracles have been
proposed to find logic bugs in such systems, that is, bugs that cause the database system to …

Specification-based program repair using SAT

D Gopinath, MZ Malik, S Khurshid - … for the Construction and Analysis of …, 2011 - Springer
Removing bugs in programs–even when location of faulty statements is known–is tedious
and error-prone, particularly because of the increased likelihood of introducing new bugs as …

Controllable combinatorial coverage in grammar-based testing

R Lämmel, W Schulte - Testing of Communicating Systems: 18th IFIP TC 6 …, 2006 - Springer
Given a grammar (or other sorts of meta-data), one can trivially derive combinatorially
exhaustive test-data sets up to a specified depth. Without further efforts, such test-data sets …

A formal approach for detection of security flaws in the android permission system

H Bagheri, E Kang, S Malek, D Jackson - Formal Aspects of Computing, 2018 - Springer
The ever increasing expansion of mobile applications into nearly every aspect of modern
life, from banking to healthcare systems, is making their security more important than ever …

Static analysis of model transformations

JS Cuadrado, E Guerra… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Model transformations are central to Model-Driven Engineering (MDE), where they are used
to transform models between different languages; to refactor and simulate models; or to …

Testing database systems via differential query execution

J Song, W Dou, Z Cui, Q Dai, W Wang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Database Management Systems (DBMSs) provide efficient data retrieval and manipulation
for many applications through Structured Query Language (SQL). Incorrect implementations …

Modular verification of code with SAT

G Dennis, FSH Chang, D Jackson - Proceedings of the 2006 …, 2006 - dl.acm.org
An approach is described for checking the methods of a class against a full specification. It
shares with traditional model checking the idea of exhausting the entire space of executions …

Analysis of invariants for efficient bounded verification

JP Galeotti, N Rosner, CG López Pombo… - Proceedings of the 19th …, 2010 - dl.acm.org
SAT-based bounded verification of annotated code consists of translating the code together
with the annotations to a propositional formula, and analyzing the formula for specification …

Cutoff bounds for consensus algorithms

O Marić, C Sprenger, D Basin - … , CAV 2017, Heidelberg, Germany, July 24 …, 2017 - Springer
Consensus algorithms are fundamental building blocks for fault-tolerant distributed systems
and their correctness is critical. However, there are currently no fully-automated methods for …

Verifying systems rules using rule-directed symbolic execution

H Cui, G Hu, J Wu, J Yang - ACM SIGPLAN Notices, 2013 - dl.acm.org
Systems code must obey many rules, such as" opened files must be closed." One approach
to verifying rules is static analysis, but this technique cannot infer precise runtime effects of …