A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

The SeaHorn verification framework

A Gurfinkel, T Kahsai, A Komuravelli… - … Conference on Computer …, 2015 - Springer
In this paper, we present SeaHorn, a software verification framework. The key distinguishing
feature of SeaHorn is its modular design that separates the concerns of the syntax of the …

Analysis and transformation of constrained Horn clauses for program verification

E De Angelis, F Fioravanti, JP Gallagher… - Theory and Practice of …, 2022 - cambridge.org
This paper surveys recent work on applying analysis and transformation techniques that
originate in the field of constraint logic programming (CLP) to the problem of verifying …

Multise: Multi-path symbolic execution using value summaries

K Sen, G Necula, L Gong, W Choi - Proceedings of the 2015 10th Joint …, 2015 - dl.acm.org
Dynamic symbolic execution (DSE) has been proposed to effectively generate test inputs for
real-world programs. Unfortunately, DSE techniques do not scale well for large realistic …

On solving universally quantified horn clauses

N Bjørner, K McMillan, A Rybalchenko - … 2013, Seattle, WA, USA, June 20 …, 2013 - Springer
Program proving can be viewed as solving for unknown relations (such as loop invariants,
procedure summaries and so on) that occur in the logical verification conditions of a …

[PDF][PDF] Advances in Automatic Software Testing: Test-Comp 2022.

D Beyer - FASE, 2022 - library.oapen.org
Test-Comp 2022 is the 4th edition of the Competition on Software Testing. Research
competitions are a means to provide annual comparative evaluations. Test-Comp focusses …

Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations

SY Chau, O Chowdhury, E Hoque, H Ge… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
The X. 509 Public-Key Infrastructure has long been used in the SSL/TLS protocol to achieve
authentication. A recent trend of Internet-of-Things (IoT) systems employing small footprint …

[PDF][PDF] Software Testing: 5th Comparative Evaluation: Test-Comp 2023.

D Beyer - FASE, 2023 - library.oapen.org
The 5th edition of the Competition on Software Testing (Test-Comp 2023) provides again an
overview and comparative evaluation of automatic test-suite generators for C programs. The …

Polynomial reachability witnesses via Stellensätze

A Asadi, K Chatterjee, H Fu, AK Goharshady… - Proceedings of the …, 2021 - dl.acm.org
We consider the fundamental problem of reachability analysis over imperative programs
with real variables. Previous works that tackle reachability are either unable to handle …

VeriMAP: A tool for verifying programs through transformations

E De Angelis, F Fioravanti, A Pettorossi… - … 2014, Held as Part of the …, 2014 - Springer
We present VeriMAP, a tool for the verification of C programs based on the transformation of
constraint logic programs, also called constrained Horn clauses. VeriMAP makes use of …