Symbolic Execution
641 Followers
Recent papers in Symbolic Execution
The present article analyses the relationship between the language of punishment and the public space in Dubrovnik from the Middle Ages until the beginning of the XIX century. It overviews justice sites and tries to understand their... more
Security analysts spend days or even weeks in trying to understand the inner workings of malicious software, using a plethora of manually orchestrated tools. Devising automated tools and techniques to assist and speed up the analysis... more
The text begins with the defining of the circus exhibitions performed on a vertical pole and with the historical track¬ing of these traditions in ancient cultures. Following this introduction, the author defines the representations of the... more
The English public execution contained elements of both tragedy and the carnivalesque (or comic), yet scholars have debated on the significance and causation of these competing elements. This paper seeks unify the two by first explaining... more
Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software vulnerabilities may need to rule out the... more
Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may... more
In the field of security software, the Common Criteria (CC) constitute an ISO standard for the evaluation of products and systems from Information Technologies. The international recognition of the Common Criteria justifies the investment... more
This article presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input, EXE runs it on symbolic input initially allowed to be... more
Interpolation has been successfully applied in formal meth- ods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct... more
Conditioned slicing can be applied to reverse engineering problems which involve the extraction of executable fragments of code in the context of some criteria of interest. This paper introduces ConSUS, a conditioner for the Wide Spectrum... more