-
1
-
-
84976473150
-
Proving pointer programs in hoare logic
-
Bornat, R.: Proving pointer programs in Hoare logic. In: MPC, pp. 102-126 (2000)
-
(2000)
MPC
, pp. 102-126
-
-
Bornat, R.1
-
2
-
-
0016674309
-
SELECT - A formal system for testing and debugging programs by symbolic execution
-
Boyer, R.S., Elspas, B., Levitt, K.N.: SELECT - a formal system for testing and debugging programs by symbolic execution. In: ICRS, pp. 234-245 (1975)
-
(1975)
ICRS
, pp. 234-245
-
-
Boyer, R.S.1
Elspas, B.2
Levitt, K.N.3
-
3
-
-
56249135986
-
Heuristics for scalable dynamic test generation
-
Burnim, J., Sen, K.: Heuristics for scalable dynamic test generation. In: ASE, pp. 443-446 (2008)
-
(2008)
ASE
, pp. 443-446
-
-
Burnim, J.1
Sen, K.2
-
4
-
-
85076893888
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
Cadar, C., Dunbar, D., Engler, D.R.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: OSDI, pp. 209-224 (2008)
-
(2008)
OSDI
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.R.3
-
5
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
DOI 10.1145/1180405.1180445, 1180445, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: EXE: automatically generating inputs of death. In: CCS, pp. 322-335 (2006) (Pubitemid 47131380)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
7
-
-
10444262814
-
Directed explicit-state model checking in the validation of communication protocols
-
Edelkamp, S., Leue, S., Lluch-Lafuente, A.: Directed explicit-state model checking in the validation of communication protocols. Software Tools for Technology Transfer 5(2), 247-267 (2004)
-
(2004)
Software Tools for Technology Transfer
, vol.5
, Issue.2
, pp. 247-267
-
-
Edelkamp, S.1
Leue, S.2
Lluch-Lafuente, A.3
-
8
-
-
19144368953
-
Trail-directed model checking
-
DOI 10.1016/S1571-0661(04)00261-0, PII S1571066104002610, Workshop on Software Model Checking (in Connection with CAV '01)
-
Edelkamp, S., Lluch-Lafuente, A., Leue, S.: Trail-directed model checking. Electrical Notes Theoretical Computer Science 55(3), 343-356 (2001) (Pubitemid 40715768)
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.55
, Issue.3
, pp. 343-356
-
-
Edelkamp, S.1
Lluch-Lafuente, A.2
Leue, S.3
-
9
-
-
17144404606
-
Scalable context-sensitive flow analysis using instantiation constraints
-
Fähndrich, M., Rehof, J., Das, M.: Scalable context-sensitive flow analysis using instantiation constraints. In: PLDI, pp. 253-263 (2000) (Pubitemid 32394099)
-
(2000)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
, pp. 253-263
-
-
Fahndrich, M.1
Rehof, J.2
Das, M.3
-
10
-
-
38149088089
-
A decision procedure for bit-vectors and arrays
-
Damm, W., Hermanns, H. (eds.) LNCS Springer, Heidelberg
-
Ganesh, V., Dill, D.L.: A decision procedure for bit-vectors and arrays. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 519-531. Springer, Heidelberg (2007)
-
(2007)
CAV 2007
, vol.4590
, pp. 519-531
-
-
Ganesh, V.1
Dill, D.L.2
-
11
-
-
31844450371
-
DART: Directed automated random testing
-
Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. In: PLDI, pp. 213-223 (2005)
-
(2005)
PLDI
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
12
-
-
70349231161
-
Active property checking
-
Godefroid, P., Levin, M.Y., Molnar, D.A.: Active property checking. In: EMSOFT, pp. 207-216 (2008)
-
(2008)
EMSOFT
, pp. 207-216
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.A.3
-
14
-
-
0036980240
-
Model checking java programs using structural heuristics
-
Groce, A., Visser, W.: Model checking Java programs using structural heuristics. In: ISSTA, pp. 12-21 (2002)
-
(2002)
ISSTA
, pp. 12-21
-
-
Groce, A.1
Visser, W.2
-
15
-
-
0017518741
-
Symbolic testing and the DISSECT symbolic evaluation system
-
Howden, W.E.: Symbolic testing and the DISSECT symbolic evaluation system. IEEE Transactions on Software Engineering 3(4), 266-278 (1977)
-
(1977)
IEEE Transactions on Software Engineering
, vol.3
, Issue.4
, pp. 266-278
-
-
Howden, W.E.1
-
16
-
-
77954708506
-
Mixing type checking and symbolic execution
-
Khoo, Y.P., Chang, B.-Y.E., Foster, J.S.: Mixing type checking and symbolic execution. In: PLDI, pp. 436-447 (2010)
-
(2010)
PLDI
, pp. 436-447
-
-
Khoo, Y.P.1
Chang, B.-Y.E.2
Foster, J.S.3
-
17
-
-
0016971687
-
Symbolic execution and program testing
-
King, J.C.: Symbolic execution and program testing. CACM 19(7), 385-394 (1976)
-
(1976)
CACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
18
-
-
80053123659
-
-
The KLEE Symbolic Virtual Machine, http://klee.llvm.org
-
-
-
-
19
-
-
4544315483
-
The set constraint/CFL reachability connection in practice
-
Kodumal, J., Aiken, A.: The set constraint/CFL reachability connection in practice. In: PLDI, pp. 207-218 (2004)
-
(2004)
PLDI
, pp. 207-218
-
-
Kodumal, J.1
Aiken, A.2
-
20
-
-
33745795134
-
Adapting an AI planning heuristic for directed model checking
-
DOI 10.1007/11691617-3, Model Checking Software - 13th International SPIN Workshop, Proceedings
-
Kupferschmid, S., Hoffmann, J., Dierks, H., Behrmann, G.: Adapting an AI planning heuristic for directed model checking. In: Valmari, A. (ed.) SPIN 2006. LNCS, vol. 3925, pp. 35-52. Springer, Heidelberg (2006) (Pubitemid 44019617)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3925
, pp. 35-52
-
-
Kupferschmid, S.1
Hoffmann, J.2
Dierks, H.3
Behrmann, G.4
-
21
-
-
85021863308
-
Pointer-induced aliasing: A problem taxonomy
-
Landi, W., Ryder, B.G.: Pointer-induced aliasing: a problem taxonomy. In: POPL, pp. 93-103 (1991)
-
(1991)
POPL
, pp. 93-103
-
-
Landi, W.1
Ryder, B.G.2
-
22
-
-
3042658703
-
LLVM: A compilation framework for lifelong program analysis transformation
-
Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis transformation. In: CGO, pp. 75-86 (2004)
-
(2004)
CGO
, pp. 75-86
-
-
Lattner, C.1
Adve, V.2
-
23
-
-
84942774185
-
Directed symbolic execution
-
April
-
Ma, K.-K., Khoo, Y.P., Foster, J.S., Hicks, M.: Directed symbolic execution. Technical Report CS-TR-4979, UMD-College Park (April 2011)
-
(2011)
Technical Report CS-TR-4979, UMD-college Park
-
-
Ma, K.-K.1
Khoo, Y.P.2
Foster, J.S.3
Hicks, M.4
-
24
-
-
34548738230
-
Hybrid concolic testing
-
Majumdar, R., Sen, K.: Hybrid concolic testing. In: ICSE, pp. 416-426 (2007)
-
(2007)
ICSE
, pp. 416-426
-
-
Majumdar, R.1
Sen, K.2
-
26
-
-
0002550919
-
A general axiom of assignment. Assignment and linked data structure. A proof of the schorr-waite algorithm
-
Broy, M., Schmidt, G. (eds.)
-
Morris, J.M.: A general axiom of assignment. Assignment and linked data structure. A proof of the Schorr-Waite algorithm. In: Broy, M., Schmidt, G. (eds.) Theoretical Foundations of Programming Methodology, pp. 25-51 (1982)
-
(1982)
Theoretical Foundations of Programming Methodology
, pp. 25-51
-
-
Morris, J.M.1
-
27
-
-
84959039613
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
LNCS Springer, Heidelberg
-
Necula, G.C., McPeak, S., Rahul, S.P., Weimer, W.: CIL: Intermediate language and tools for analysis and transformation of C programs. In: CC 2002. LNCS, vol. 2304, pp. 213-228. Springer, Heidelberg (2002)
-
(2002)
CC 2002
, vol.2304
, pp. 213-228
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.P.3
Weimer, W.4
-
29
-
-
84860373391
-
Program testing techniques using simulated execution
-
Osterweil, L.J., Fosdick, L.D.: Program testing techniques using simulated execution. In: ANSS, pp. 171-177 (1976)
-
(1976)
ANSS
, pp. 171-177
-
-
Osterweil, L.J.1
Fosdick, L.D.2
-
30
-
-
17644398246
-
Type-base flow analysis: From polymorphic subtyping to CFL-reachability
-
Rehof, J., Fähndrich, M.: Type-base flow analysis: from polymorphic subtyping to CFL-reachability. In: PLDI, pp. 54-66 (2001)
-
(2001)
PLDI
, pp. 54-66
-
-
Rehof, J.1
Fähndrich, M.2
-
31
-
-
77954702589
-
Using symbolic evaluation to understand behavior in configurable software systems
-
Reisner, E., Song, C., Ma, K.-K., Foster, J.S., Porter, A.: Using symbolic evaluation to understand behavior in configurable software systems. In: ICSE, pp. 445-454 (2010)
-
(2010)
ICSE
, pp. 445-454
-
-
Reisner, E.1
Song, C.2
Ma, K.-K.3
Foster, J.S.4
Porter, A.5
-
32
-
-
0242396553
-
Program analysis via graph reachability
-
Reps, T.W.: Program analysis via graph reachability. In: ILPS, pp. 5-19 (1997)
-
(1997)
ILPS
, pp. 5-19
-
-
Reps, T.W.1
-
33
-
-
80053117873
-
-
μClibc, http://www.uclibc.org/
-
-
-
-
34
-
-
70450057300
-
Fitness-guided path exploration in dynamic symbolic execution
-
Xie, T., Tillmann, N., de Halleux, J., Schulte, W.: Fitness-guided path exploration in dynamic symbolic execution. In: DSN, pp. 359-368 (2009)
-
(2009)
DSN
, pp. 359-368
-
-
Xie, T.1
Tillmann, N.2
De Halleux, J.3
Schulte, W.4
-
35
-
-
80053100149
-
-
Personal communication (May)
-
Zamfir, C.: Personal communication (May 2011)
-
(2011)
-
-
Zamfir, C.1
-
36
-
-
77954609085
-
Execution synthesis: A technique for automated software debugging
-
Zamfir, C., Candea, G.: Execution synthesis: a technique for automated software debugging. In: EuroSys, pp. 321-334 (2010)
-
(2010)
EuroSys
, pp. 321-334
-
-
Zamfir, C.1
Candea, G.2
|