Graph based Binary Code Execution Path Exploration Platform for Dynamic Symbolic Execution
نویسندگان
چکیده
منابع مشابه
Infeasible path generalization in dynamic symbolic execution
Context: Automatic code-based test input generation aims at generating a test suite ensuring good code coverage. Dynamic Symbolic Execution (DSE) recently emerged as a strong code-based testing technique to increase coverage by solving path conditions with a combination of symbolic constraint solving and concrete executions. Objective: When selecting paths in DSE for generating test inputs, som...
متن کاملDynamic Symbolic Execution with Interpolation Based Path Merging
This paper presents a dynamic symbolic execution engine for automated bug detection in C code. It uses path merging based on interpolation with unsatisfiable cores to mitigate the exponential path explosion problem. Code coverage can be scaled by varying the interpolation. An algorithm for error and branch coverage is described. The implementation extends Eclipse CDT. It is evaluated on buffer ...
متن کاملDeconstructing Dynamic Symbolic Execution
Dynamic symbolic execution (DSE) is a well-known technique for automatically generating tests to achieve higher levels of coverage in a program. Two keys ideas of DSE are to: (1) seed symbolic execution by executing a program on an initial input; (2) using concrete values from the program execution in place of symbolic expressions whenever symbolic reasoning is hard or not desired. We describe ...
متن کاملAbstracting Path Conditions for Effective Symbolic Execution
ing Path Conditions for Effective Symbolic Execution Marek Trt́ık [email protected]
متن کاملDynamic Symbolic Execution for Testing Distributed Objects
This paper extends dynamic symbolic execution to distributed and concurrent systems. Dynamic symbolic execution can be used in software testing to systematically identify equivalence classes of input values and has been shown to scale well to large systems. Although mainly applied to sequential programs, this scalability makes it interesting to consider the technique in the distributed and conc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2014
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2014.24.3.437