메뉴 건너뛰기




Volumn 19, Issue 4, 2012, Pages 531-559

StrSolve: Solving string constraints lazily

Author keywords

Decision procedure; Regular language; Scalability; String

Indexed keywords

FORMAL LANGUAGES; LOGIC PROGRAMMING; SCALABILITY;

EID: 84865235665     PISSN: 09288910     EISSN: 15737535     Source Type: Journal    
DOI: 10.1007/s10515-012-0111-x     Document Type: Article
Times cited : (35)

References (51)
  • 5
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • 0593.94022 10.1109/TC.1986.1676819
    • R.E. Bryant 1986 Graph-based algorithms for boolean function manipulation IEEE Trans. Comput. 35 8 677 691 0593.94022 10.1109/TC.1986.1676819
    • (1986) IEEE Trans. Comput. , vol.35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 9
    • 24944448541 scopus 로고    scopus 로고
    • Simplify: A theorem prover for program checking
    • DOI 10.1145/1066100.1066102
    • D. Detlefs G. Nelson J.B. Saxe 2005 Simplify: a theorem prover for program checking J. ACM 52 3 365 473 10.1145/1066100.1066102 2146512 10.1145/1066100.1066102 (Pubitemid 43078377)
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 365-473
    • Detlefs, D.1    Nelson, G.2    Saxe, J.B.3
  • 11
    • 79952426439 scopus 로고    scopus 로고
    • Modeling regular replacement for string constraint solving
    • NASA, Langley Research Center, Hampton, VA 23681-2199, USA C. Muñoz (eds)
    • Fu, X.; Li, C.C.: Modeling regular replacement for string constraint solving. In: Muñoz, C. (ed.) Proceedings of the Second NASA Formal Methods Symposium (NFM 2010), NASA/CP-2010-216215, NASA, Langley Research Center, Hampton, VA 23681-2199, USA, pp. 67-76 (2010)
    • (2010) Proceedings of the Second NASA Formal Methods Symposium (NFM 2010), NASA/CP-2010-216215 , pp. 67-76
    • Fu, X.1    Li, C.C.2
  • 12
    • 84886089312 scopus 로고    scopus 로고
    • Simple linear string constraints
    • doi: 10.1007/s00165-011-0214-3
    • Fu, X.; Powell, M.; Bantegui, M.; Li, C.C.: Simple linear string constraints. Form. Asp. Comput. 1-45 (2012). doi: 10.1007/s00165-011-0214-3
    • (2012) Form. Asp. Comput. , pp. 1-45
    • Fu, X.1    Powell, M.2    Bantegui, M.3    Li C., .C.4
  • 13
    • 84865201297 scopus 로고    scopus 로고
    • Fujitsu Laboratories: Fujitsu develops technology to enhance comprehensive testing of Java programs
    • Fujitsu Laboratories: Fujitsu develops technology to enhance comprehensive testing of Java programs (2010). URL http://www.fujitsu.com/ global/news/pr/archives/month/2010/20100112-02.html
    • (2010)
  • 14
    • 38149088089 scopus 로고    scopus 로고
    • A decision procedure for bit-vectors and arrays
    • 10.1007/978-3-540-73368-3-52
    • Ganesh, V.; Dill, D.L.: A decision procedure for bit-vectors and arrays. In: Computer-Aided Verification, pp. 519-531 (2007)
    • (2007) Computer-Aided Verification , pp. 519-531
    • Ganesh, V.1    Dill, D.L.2
  • 23
    • 0141639607 scopus 로고    scopus 로고
    • Follow automata
    • 10.1016/S0890-5401(03)00090-7 2001743 1059.68063 10.1016/S0890-5401(03) 00090-7
    • L. Ilie S. Yu 2003 Follow automata Inf. Comput. 186 1 140 162 10.1016/S0890-5401(03)00090-7 2001743 1059.68063 10.1016/S0890-5401(03)00090-7
    • (2003) Inf. Comput. , vol.186 , Issue.1 , pp. 140-162
    • Ilie, L.1    Yu, S.2
  • 26
    • 77949808417 scopus 로고    scopus 로고
    • Automated test data generation for coverage: Haven't we solved this problem yet?
    • 10.1109/TAICPART.2009.15
    • Lakhotia, K.; McMinn, P.; Harman, M.: Automated test data generation for coverage: haven't we solved this problem yet? In: Testing Academia and Industry Conference, pp. 95-104 (2009)
    • (2009) Testing Academia and Industry Conference , pp. 95-104
    • Lakhotia, K.1    McMinn, P.2    Harman, M.3
  • 27
    • 78049327633 scopus 로고    scopus 로고
    • An empirical investigation into branch coverage for c programs using cute and Austin
    • 10.1016/j.jss.2010.07.026
    • K. Lakhotia P. McMinn M. Harman 2010 An empirical investigation into branch coverage for c programs using cute and Austin J. Syst. Softw. 83 12 2379 2391 10.1016/j.jss.2010.07.026
    • (2010) J. Syst. Softw. , vol.83 , Issue.12 , pp. 2379-2391
    • Lakhotia, K.1    McMinn, P.2    Harman, M.3
  • 30
    • 58049169957 scopus 로고    scopus 로고
    • Directed test generation using symbolic grammars
    • Majumdar, R.; Xu, R.G.: Directed test generation using symbolic grammars. In: Automated Software Engineering, pp. 134-143 (2007)
    • (2007) Automated Software Engineering , pp. 134-143
    • Majumdar, R.1    Xu, R.G.2
  • 31
    • 33749823368 scopus 로고    scopus 로고
    • Static approximation of dynamically generated web pages
    • http://doi.acm.org/10.1145/1060745.1060809
    • Y. Minamide 2005 Static approximation of dynamically generated web pages International Conference on the World Wide Web 432 441 http://doi.acm.org/10. 1145/1060745.1060809
    • (2005) International Conference on the World Wide Web , pp. 432-441
    • Minamide, Y.1
  • 32
    • 33749823368 scopus 로고    scopus 로고
    • Static approximation of dynamically generated web pages
    • Minamide, Y.: Static approximation of dynamically generated web pages. In: International Conference on the World Wide Web, pp. 432-441 (2005). http://doi.acm.org/10.1145/1060745.1060809
    • (2005) International Conference on the World Wide Web , pp. 432-441
    • Minamide, Y.1
  • 39
    • 33745216482 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Su, Z.; Wassermann, G.: The essence of command injection attacks in web applications. In: Principles of Programming Languages, pp. 372-382 (2006)
    • (2006) Principles of Programming Languages , pp. 372-382
    • Su, Z.1    Wassermann, G.2
  • 40
    • 80051944491 scopus 로고    scopus 로고
    • Path- and index-sensitive string analysis based on monadic second-order logic
    • ACM New York
    • Tateishi, T.; Pistoia, M.; Tripp, O.: Path- and index-sensitive string analysis based on monadic second-order logic. In: ISSTA '11, pp. 166-176. ACM, New York (2011)
    • (2011) ISSTA '11 , pp. 166-176
    • Tateishi, T.1    Pistoia, M.2    Tripp, O.3
  • 46
    • 26444583266 scopus 로고    scopus 로고
    • Saturn: A SAT-based tool for bug detection
    • Computer Aided Verification: 17th International Conference, CAV 2005. Proceedings
    • Xie, Y.; Aiken, A.: Saturn: a SAT-based tool for bug detection. In: Computer Aided Verification, pp. 139-143 (2005) (Pubitemid 41431726)
    • (2005) Lecture Notes in Computer Science , vol.3576 , pp. 139-143
    • Xie, Y.1    Aiken, A.2
  • 47
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Xie, Y.; Aiken, A.: Static detection of security vulnerabilities in scripting languages. In: USENIX Security Symposium, pp. 179-192 (2006)
    • (2006) USENIX Security Symposium , pp. 179-192
    • Xie, Y.1    Aiken, A.2
  • 48
    • 77952112519 scopus 로고    scopus 로고
    • Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
    • Yu, F.; Alkhalaf, M.; Bultan, T.: Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses. In: Automated Software Engineering, pp. 605-609 (2009a)
    • (2009) Automated Software Engineering , pp. 605-609
    • Yu, F.1    Alkhalaf, M.2    Bultan, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.