dynamic symbolic execution
Recently Published Documents


TOTAL DOCUMENTS

80
(FIVE YEARS 20)

H-INDEX

11
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Lannan Luo ◽  
Qiang Zeng ◽  
Bokai Yang ◽  
Fei Zuo ◽  
Junzhe Wang

2021 ◽  
Vol 206 ◽  
pp. 102608
Author(s):  
Weigang He ◽  
Jianqi Shi ◽  
Ting Su ◽  
Zeyu Lu ◽  
Li Hao ◽  
...  

Author(s):  
Sooyoung Cha ◽  
Seongjoon Hong ◽  
Jiseong Bak ◽  
Jingyoung Kim ◽  
Junhee Lee ◽  
...  

Author(s):  
Malte Mues ◽  
Falk Howar

AbstractJDartperforms dynamic symbolic execution ofJavaprograms: it executes programs with concrete inputs while recording symbolic constraints on executed program paths. A portfolio of constraint solvers is then used for generating new concrete values from recorded constraints that drive execution along previously unexplored paths. For SV-COMP 2021, we improvedJDartby implementing exploration strategies, bounded analysis, and path-specific constraint solving strategies, as well as by enabling the use of SMT-Lib string theory for encoding of string operations.


Electronics ◽  
2020 ◽  
Vol 10 (1) ◽  
pp. 62
Author(s):  
Fayozbek Rustamov ◽  
Juhwan Kim ◽  
Jihyeon Yu ◽  
Hyunwook Kim ◽  
Joobeom Yun

Greybox Fuzzing is the most reliable and essentially powerful technique for automated software testing. Notwithstanding, a majority of greybox fuzzers are not effective in directed fuzzing, for example, towards complicated patches, as well as towards suspicious and critical sites. To overcome these limitations of greybox fuzzers, Directed Greybox Fuzzing (DGF) approaches were recently proposed. Current DGFs are powerful and efficient approaches that can compete with Coverage-Based Fuzzers. Nevertheless, DGFs neglect to accomplish stability between usefulness and proficiency, and random mutations make it hard to handle complex paths. To alleviate this problem, we propose an innovative methodology, a target-oriented hybrid fuzzing tool that utilizes a fuzzer and dynamic symbolic execution (also referred to as a concolic execution) engine. Our proposed method aims to generate inputs that can quickly reach the target sites in each sequence and trigger potential hard-to-reach vulnerabilities in the program binary. Specifically, to dive deep into the target binary, we designed a proposed technique named BugMiner, and to demonstrate the capability of our implementation, we evaluated it comprehensively on bug hunting and crash reproduction. Evaluation results showed that our proposed implementation could not only trigger hard-to-reach bugs 3.1, 4.3, 2.9, 2.0, 1.8, and 1.9 times faster than Hawkeye, AFLGo, AFL, AFLFast, QSYM, and ParmeSan respectively but also scale to several real-world programs.


Author(s):  
Alexey Vishnyakov ◽  
Andrey Fedotov ◽  
Daniil Kuts ◽  
Alexander Novikov ◽  
Darya Parygina ◽  
...  

Author(s):  
Malte Mues ◽  
Falk Howar

Abstract JDart performs dynamic symbolic execution of Java programs: it executes programs with concrete inputs while recording symbolic constraints on executed program paths. A constraint solver is then used for generating new concrete values from recorded constraints that drive execution along previously unexplored paths. JDart is built on top of the Java PathFinder software model checker and uses the JConstraints library for the integration of constraint solvers.


Sign in / Sign up

Export Citation Format

Share Document