Finding code that explodes under symbolic evaluation
نویسندگان
چکیده
منابع مشابه
Under-Constrained Symbolic Execution: Correctness Checking for Real Code
Software bugs are a well-known source of security vulnerabilities. One technique for finding bugs, symbolic execution, considers all possible inputs to a program but suffers from scalability limitations. This paper uses a variant, under-constrained symbolic execution, that improves scalability by directly checking individual functions, rather than whole programs. We present UC-KLEE, a novel, sc...
متن کاملSymbolic Testing of OpenCL Code
We present an effective technique for crosschecking a C or C++ program against an accelerated OpenCL version, as well as a technique for detecting data races in OpenCL programs. Our techniques are implemented in KLEE-CL, a symbolic execution engine based on KLEE and KLEE-FP that supports symbolic reasoning on the equivalence between symbolic values. Our approach is to symbolically model the Ope...
متن کاملTranscending the Conceptual Symbolic Code
a hierarchy of information processing is proposed, with the provisionally highest level being the symbolic reasoning that distinguishes humans from animals. This level is based on an abstract language of thought or “code”, consisting of concepts represented by symbols and a syntactical mechanism for combining these concepts into new expressions. The main shortcoming of this conceptual-symbolic ...
متن کاملSymbolic Manipulation of Code Properties
The FAdo system is a symbolic manipulator of formal languages objects, implemented in Python. In this work, we extend its capabilities by implementing methods to manipulate transducers and we go one level higher than existing formal language systems and implement methods to manipulate objects representing classes of independent languages (widely known as code properties). Our methods allow user...
متن کاملFinding Symbolic Bug Patterns in Sensor Networks
This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multiple seemingly different event patterns lead to the same type of failure manifestation. A hidden relationship exists, in those patterns, among event attributes that is somehow responsible for the failure. For example, in some syst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ACM on Programming Languages
سال: 2018
ISSN: 2475-1421
DOI: 10.1145/3276519