Symbolic execution

Results: 153



#Item
81Theoretical computer science / Constraint programming / Fuzz testing / Symbolic execution / KeY / Sage / Constraint optimization / Concolic testing / Software testing / Mathematical software / Software engineering

Billions and Billions of Constraints: Whitebox Fuzz Testing in Production Ella Bounimova Patrice Godefroid

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-03-15 15:23:34
82Computing / Concolic testing / Symbolic execution / Java Pathfinder / Test Data Generation / Fuzz testing / KeY / Model checking / Dynamic program analysis / Software testing / Formal methods / Software development

Symbolic Execution for Software Testing in Practice – Preliminary Assessment Imperial College London Microsoft Research

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-04-25 20:08:55
83Complexity classes / Probabilistic complexity theory / Analysis of algorithms / Randomized algorithm / NL / PP / Algorithm / Monte Carlo method / Scheduling / Theoretical computer science / Computational complexity theory / Applied mathematics

Exact and Approximate Probabilistic Symbolic Execution for Nondeterministic Programs Kasper S. Luckow ˘ areanu ˘

Add to Reading List

Source URL: www.cs.sun.ac.za

Language: English - Date: 2014-09-18 09:08:01
84Formal methods / Abstract interpretation / Symbolic execution / Functional languages / Models of computation / Model checking / Function / Programming language / Test / Mathematics / Theoretical computer science / Computing

A Lightweight Symbolic Virtual Machine for Solver-Aided Host Languages Emina Torlak Rastislav Bodik

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
85Software bugs / Software testing / Automated theorem proving / Concolic testing / Buffer overflow / Symbolic execution / Arithmetic overflow / String / C / Software engineering / Computing / Computer programming

University of California Los Angeles Symbolic Execution Algorithms for Test Generation

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-11-23 07:14:40
86Data / Transaction processing / Abstract interpretation / Symbolic execution / MIX / Hash table / ATS / CPU cache / Extensible Storage Engine / Computing / Computer memory / Computer programming

R ET C ON: Transactional Repair without Replay Colin Blundell Arun Raghavan Milo M. K. Martin

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2010-04-10 11:24:17
87Automated theorem proving / Concolic testing / Logic in computer science / Java Pathfinder / Symbolic execution / Interprocedural optimization / Control flow / KeY / Software bug / Software engineering / Formal methods / Computing

PDF Document

Add to Reading List

Source URL: galois.com

Language: English - Date: 2014-07-17 17:29:47
88Packet Processing / Pipeline / Stack / Parallel computing / Symbolic execution / KeY / Microarchitecture / Computing / Computer architecture / Inter-process communication

Software Dataplane Verification Mihai Dobrescu and Katerina Argyraki, École Polytechnique Fédérale de Lausanne https://www.usenix.org/conference/nsdi14/technical-sessions/presentation/dobrescu This paper is included i

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-03 07:47:13
89Real-time computing / Worst-case execution time / Symbolic execution / KeY / Program slicing / Analysis of algorithms / Model checking / Control flow / Abstract interpretation / Theoretical computer science / Programming language theory / Computing

The Auspicious Couple: Symbolic Execution and WCET Analysis * Armin Biere1 , Jens Knoop2 , Laura Kovács3 , and Jakob Zwirchmayr2 1 2 3

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2013-12-12 08:46:27
90Automated theorem proving / Concolic testing / Symbolic execution / Reliability engineering / KeY / Code injection / Function / Mathematics / Formal methods / Systems engineering

Reliability Digest, NovemberExploit Generation from Software Failures Shih-Kun Huang Information Technology Service Center National Chiao Tung University

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2014-11-17 21:02:54
UPDATE