Generalizing symbolic execution to library classes
نویسندگان
چکیده
منابع مشابه
Finding Classes by Execution from an Object-Oriented Class Library
This paper describes an improved method of execution-based retrieval of classes from an objectoriented class library. In this method, a user provides sample data on the constructor, observer and modifier methods of a desired class in order, and the system organizes them into a test program and executes the test program using classes in the selected class library. The system then returns to the ...
متن کاملSymbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution
Symbolic execution of a language is traditionally achieved by replacing the language’s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of the existing interpret infrastructure as possible, both for handling aspects of the computation that are not symbolic, and for propagating symbolic ones. This approach was used ...
متن کاملTSO to SC via Symbolic Execution
Modern multi-core processors equipped with weak memory models like TSO exhibit executions which – due to store buffers – seemingly reorder program operations. Thus, they deviate from the commonly assumed sequential consistency (SC) semantics. Analysis techniques for concurrent programs consequently need to take reorderings into account. For TSO, this is often accomplished by explicitly modellin...
متن کاملUsing symbolic execution to guide test generation
1Department of Computer Science and Software Engineering, The University of Western Australia, Crawley, WA 6009, Australia 2Department of Electrical Engineering, The University of Auckland, Private Bag 92019, Auckland, New Zealand 3Department of Electrical and Electronics Engineering, Chung-Ang University, Huksuk-dong 221, Dongjak-gu, Seoul 156-756, South Korea 4Division of Science and Engineer...
متن کاملLinear Obfuscation to Combat Symbolic Execution
Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious code and analyzing the trigger condition. We propose a novel automatic malware obfuscation technique to make analysis based on symbolic execution difficult. Unlike previously proposed tech...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGSOFT Software Engineering Notes
سال: 2006
ISSN: 0163-5948
DOI: 10.1145/1108768.1108817