Home

Awesome

A bibliography of papers related to symbolic execution

The following list was earlier hosted at https://sites.google.com/site/symexbib/. From now on, the plan is to update only this list.

The list is a bit out of date since I have not added many papers since 2013. But I would love to keep it up to date. If you want to add any paper to the list, please send a pull request or email me (http://www.cs.stanford.edu/~saswat).

TitleVenueYearAuthors
Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive TestingVMCAI2015Maria Christakis, Patrice Godefroid
Dynamic Test Generation with Static Fields and InitializersRV2014Maria Christakis, Patrick Emmisberger, Peter Müller
Synthesizing Parameterized Unit Tests to Detect Object Invariant ViolationsSEFM2014Maria Christakis, Peter Müller, Valentin Wüstholz
Enhancing Symbolic Execution with VeritestingICSE2014Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley
Prototyping Symbolic Execution Engines for Interpreted LanguagesASPLOS2014Stefan Bucur, Johannes Kinder, George Candea
Finding Trojan Message Vulnerabilities in Distributed SystemsASPLOS2014Radu Banabic, George Candea, Rachid Guerraoui
How We Get There: A Context-Guided Search Strategy in Concolic TestingFSE2014Hyunmin Seo and Sunghun Kim
SymJS: Automatic Symbolic Testing of JavaScript Web ApplicationsFSE2014Guodong Li, Esben Andreasen, and Indradeep Ghosh
Statistical Symbolic Execution with Informed SamplingFSE2014Antonio Filieri, Corina S. Păsăreanu, Willem Visser, and Jaco Geldenhuys
Extending a Search-Based Test Generator with Adaptive Dynamic Symbolic ExecutionISSTA2014Juan Pablo Galeotti, Gordon Fraser, and Andrea Arcuri
Using Test Case Reduction and Prioritization to Improve Symbolic ExecutionISSTA2014Chaoqiang Zhang, Alex Groce, Mohammad Amin Alipour
Enhancing Symbolic Execution with Built-In Term Rewriting and Constrained Lazy InitializationFSE2013P. Braione, G. Denaro, M. Pezzè
AppIntent: analyzing sensitive data transmission in android for privacy leakage detectionCCS2013Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu,Peng Ning, X. Sean Wang
Z3-str: a z3-based string solver for web application analysisFSE2013Yunhui Zheng, Xiangyu Zhang, Vijay Ganesh
An orchestrated survey of methodologies for automated software test case generationJournal of Systems and Software2013Saswat Anand, Edmund Burke, Tsong Yueh Chen, John Clark, Myra B. Cohen, Wolfgang Grieskamp, Mark Harman, Mary Jean Harrold, Phil McMinn
Verifying systems rules using rule-directed symbolic executionASPLOS2013Heming Cui, Gang Hu, Jingyue Wu, and Junfeng Yang
Symbolic Execution for Software Testing: Three Decades LaterCACM2013Cristian Cadar and Koushik Sen.
Boosting concolic testing via interpolationFSE2013Joxan Jaffar, Vijayaraghavan Murali, and Jorge A. Navas
Jalangi: a tool framework for concolic testing, selective record-replay, and dynamic analysis of JavaScriptFSE2013
Explicating symbolic execution (xSymExe): an evidence-based verification frameworkICSE2013John Hatcliff, Robby, Patrice Chalin, and Jason Belt
Memoise: A tool for memoized symbolic executionICSE2013Guowei Yang, Sarfraz Khurshid, and Corina S. Păsăreanu
Billions and Billions of Constraints: Whitebox Fuzz Testing in ProductionICSE2013Ella Bounimova, Patrice Godefroid, David Molnar
Feedback-directed unit test generation for C/C++ using concolic executionICSE2013Pranav Garg, Franjo Ivancic, Gogul Balakrishnan, Naoto Maeda, and Aarti Gupta
Reliability analysis in symbolic pathfinderICSE2013Antonio Filieri, Corina S. Păsăreanu, and Willem Visser
Input-covering schedules for multithreaded programsOOPSLA2013Tom Bergan, Luis Ceze, and Dan Grossman
Steering symbolic execution to less traveled pathsOOPSLA2013You Li, Zhendong Su, Linzhang Wang, and Xuandong Li
A Generic Framework for Symbolic ExecutionSLE2013Andrei Arusoaie, Dorel Lucanu, Vlad Rusu
Symbiotic: Synergy of instrumentation, slicing, and symbolic executionTACAS2013Jiri Slaby, Jan Strejček, Marek Trtík
SmacC: A Retargetable Symbolic Execution EngineTACAS2013Armin Biere, Jens Knoop, Laura Kovács, Jakob Zwirchmayr
Path exploration based on symbolic outputTOSEM2013Dawei Qi, Hoang D. T. Nguyen, and Abhik Roychoudhury
Redundant State Detection for Dynamic Symbolic ExecutionUSENIX2013Suhabe Bugrara, Dawson Engler
Augmented dynamic symbolic executionASE2012Konrad Jamrozik, Gordon Fraser, Nikolai Tillmann and Jonathan de Halleux
Collaborative Verification and Testing with Explicit AssumptionsFM2012Maria Christakis, Peter Müller, Valentin Wüstholz
Automated Concolic Testing of Smartphone AppsFSE2012Saswat Anand, Mayur Naik, Hongseok Yang, Mary Jean Harrold
Data Races vs. Data Race Bugs: Telling the Difference with PortendASPLOS2012Baris Kasikci, Cristian Zamfir, George Candea
TRACER: A Symbolic Execution Tool for VerificationCAV2012Joxan Jaffar, Vijayaraghavan Murali, Jorge A. Navas, Andrew E. Santosa
Computational verification of C protocol implementations by symbolic executionCCS2012Mihhail Aizatulin, Andrew D. Gordon, and Jan Jürjens
Integration testing of software product lines using compositional symbolic executionFASE2012Jiangfan Shi, Myra B. Cohen, Matthew B. Dwyer
Rubicon: bounded verification of web applicationsFSE2012Joseph P. Near and Daniel Jackson
Green: reducing, reusing and recycling constraints in program analysisFSE2012Willem Visser, Jaco Geldenhuys, and Matthew B. Dwyer
make test-zesti: A Symbolic Execution Solution for Improving Regression TestingICSE2012Paul Dan Marinescu, Cristian Cadar
A Scalable Distributed Concolic Testing Approach: An Empirical EvaluationICST2012Moonzoo Kim, Yunho Kim, Gregg Rothermel
Symbolic Execution with Interval Solving and Meta-heuristic SearchICST2012Mateus Borges, Marcelo d’Amorim, Saswat Anand, David Bushnell, Corina S. Pasareanu
Probabilistic symbolic executionISSTA2012Jaco Geldenhuys, Matthew B. Dwyer, and Willem Visser
Memoized symbolic executionISSTA2012Guowei Yang, Corina S. Păsăreanu, and Sarfraz Khurshid
Higher-order symbolic execution via contractsOOPSLA2012Sam Tobin-Hochstadt and David Van Horn
Scaling symbolic execution using ranged analysisOOPSLA2012Junaid Haroon Siddiqui and Sarfraz Khurshid
Symdrive: testing drivers without devicesOSDI2012Matthew J. Renzelmann, Asim Kadav, and Michael M. Swift
Efficient state merging in symbolic executionPLDI2012Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, and George Candea
GKLEE: concolic verification and test generation for GPUsPPoPP2012Guodong Li, Peng Li, Geof Sawaya, Ganesh Gopalakrishnan, Indradeep Ghosh, and Sreeranga P. Rajan
Loop invariant symbolic execution for parallel programsVMCAI2012Stephen F. Siegel, and Timothy K. Zirkel
Heap Cloning: Enabling Dynamic Symbolic Execution of Java ProgramsASE2011Saswat Anand, Mary Jean Harrold
S2E: A Platform for In-Vivo Multi-Path Analysis of Software SystemsASPLOS2011Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
LCT: An Open Source Concolic Testing Tool for Java ProgramsBytecode2011Kähkönen, K., Launiainen, T, Saarikivi, O., Kauttio, J., Heljanko, K., and Niemelä, I.
KLOVER: A Symbolic Execution and Automatic Test Generation Tool for C++ ProgramsCAV2011Guodong Li, Indradeep Ghosh, Sreeranga Rajan
Practical, low-effort verification of real code using under-constrained executionCAV2011David Ramos, Dawson Engler
WAPTEC: whitebox analysis of web applications for parameter tampering exploit constructionCCS2011Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan
Symbolic Crosschecking of Floating-Point and SIMD CodeEuroSys2011Peter Collingbourne, Cristian Cadar, Paul H. J. Kelly
Parallel Symbolic Execution for Automated Real-World Software TestingEuroSys2011Stefan Bucur, Vlad Ureche, Cristian Zamfir, George Candea
Theoretical aspects of compositional symbolic executionFASE2011Dries Vanoverberghe, Frank Piessens
Testing Software In Age Of Data Privacy: A Balancing ActFSE2011Kunal Taneja, Mark Grechanik, Rayid Ghani and Tao Xie
Path Exploration based on Symbolic OutputFSE2011Dawei Qi, Hoang D.T. Nguyen, Abhik Roychoudhury
Testing MapReduce-style programsFSE (New Ideas Track)2011Christoph Csallner, Leonidas Fegaras, Chengkai Li
Camouflage: Automated Anonymization of Field DataICSE2011James Clause, Alex Orso
Precise Identification of Problems for Structural Test GenerationICSE2011Xusheng Xiao, Tao Xie, Nikolai Tillmann, Jonathan de Halleux
Symbolic Execution for Software Testing in Practice -- Preliminary AssessmentICSE Impact Project Focus Area2011Christian Cadar, Patrice Godefroid, Sarfraz Khurshid, Corina Pasareanu, Koushik Sen, Nikolai Tillmann, Willem Visser
Lazy symbolic execution for test data generationIET Software2011M.X. Lin, Y.L. Chen, K. Yu, G.S. Wu
Statically-Directed Dynamic Automated Test GenerationISSTA2011Domagoj Babic, Lorenzo Martignoni, Stephen McCamant, Dawn Song
Automatic Partial Loop Summarization in Dynamic Test GenerationISSTA2011Patrice Godefroid, Daniel Luchaup
Symbolic Execution with Mixed Concrete-Symbolic SolvingISSTA2011Corina Pasareanu, Neha Rungta, Willem Visser
Selecting peers for execution comparisonISSTA2011William N. Sumner, Tao Bao, Xiangyu Zhang
eXpress: Guided Path Exploration for Efficient Regression Test GenerationISSTA2011Kunal Taneja, Tao Xie, Nikolai Tillmann, Jonathan De Halleux
Path-based Inductive Synthesis for Program InversionPLDI2011Saurabh Srivastava, Sumit Gulwani, Swarat Chaudhuri, Jeffrey S. Foster
kb-Anonymity: A Model for Anonymized Behavior-Preserving Test and Debugging DataPLDI2011Aditya Budi, David Lo, Lingxiao Jiang, Lucia
Higher-Order Test GenerationPLDI2011Patrice Godefroid
Directed Incremental Symbolic ExecutionPLDI2011Suzette Person, Guowei Yang, Neha Rungta, Sarfraz Khurshid
Automatic Formal Verification of MPI-Based Parallel ProgramsPPoPP2011Stephen F. Siegel, Timothy K. Zirkel
Unbounded Symbolic Execution for Program VerificationRV2011Joxan Jaffar, Jorge A. Navas, Andrew E. Santosa
Directed Symbolic ExecutionSAS2011Kin-Keung Ma, Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability DiscoveryUSENIX Security2011Chia Yuan Cho, Domagoj Babić, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song
Collective AssertionsVMCAI2011Stephen F. Siegel, Timothy K. Zirkel
Automatically Preparing Safe SQL Queries2010Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan
Symbolic PathFinder: symbolic execution of Java bytecodeASE2010Corina S. Păsăreanu, Neha Rungta
Solving string constraints lazilyASE2010Pieter Hooimeijer, Westley Weimer
Abstract Analysis of Symbolic ExecutionsCAV2010Aws Albarghouthi, Arie Gurfinkel, Ou Wei, Marsha Chechik
JReq: Database Queries in Imperative LanguagesCC2010Ming-Yee Iu, Emmanuel Cecchet, Willy Zwaenepoel
Input generation via decomposition and re-stitching: finding bugs in MalwareCCS2010Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babi ć, Dawn Song
Symbolic Security Analysis of Ruby-on-Rails Web ApplicationsCCS2010Avik Chaudhuri, Jeffrey S. Foster
Privacy-preserving genomic computation through program specializationCCS2010Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Michael K. Reiter, Zheng Dong
NoTamper: Automatic Blackbox Detection of Parameter Tampering Opportunities in Web ApplicationsCCS2010Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan
Reverse engineering of binary device drivers with RevNICEuroSys2010Vitaly Chipounov, George Candea
HadoopToSQL: a mapReduce query optimizerEuroSys2010Ming-Yee Iu, Willy Zwaenepoel
Execution Synthesis: A Technique for Automated Software DebuggingEuroSys2010Cristian Zamfir, George Candea
Directed test suite augmentation: techniques and tradeoffsFSE2010Zhihong Xu, Yunho Kim, Moonzoo Kim, Gregg Rothermel, Myra B. Cohen
Using symbolic evaluation to understand behavior in configurable software systemsICSE2010Elnatan Reisner, Charles Song, Kin-Keung Ma, Jeffrey S. Foster, Adam Porter
FloPSy: search-based floating point constraint solving for symbolic executionIntl Conf on Testing software and systems2010Kiran Lakhotia, Nikolai Tillmann, Mark Harman, Jonathan De Halleux
Is Data Privacy Always Good for Software Testing?ISSRE2010Mark Grechanik, Christoph Csallner, Chen Fu, Qing Xie
Exploiting program dependencies for scalable multiple-path symbolic executionISSTA2010Raul Santelices, Mary Jean Harrold
Directed Test Generation for Effective Fault LocalizationISSTA2010Shay Artzi, Julian Dolby, Frank Tip, Marco Pistoi
Proving Memory Safety of Floating-Point Computations by Combining Static and Dynamic Program AnalysisISSTA2010Patrice Godefroid, Johannes Kinder
Parallel symbolic execution for structural test generationISSTA2010Matt Staats, Corina Pǎsǎreanu
An empirical investigation into branch coverage for C programs using CUTE and AUSTINJournal of Systems and Software2010Kiran Lakhotia, Phil McMinn, Mark Harman
Systematic Testing for Control ApplicationsMemoCODE2010Rupak Majumdar, Indranil Saha, Zilong Wang
Mixing type checking and symbolic executionPLDI2010Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Foster
Program Analysis via Satisfiability Modulo Path ProgramsPOPL2010William R. Harris, Sriram Sankaranarayanan, Franjo Ivancic, Aarti Gupta
Compositional may-must program analysis: unleashing the power of alternationPOPL2010Patrice Godefroid, Aditya V. Nori, Sriram K. Rajamani, Sai Deep Tetali
Experimental comparison of concolic and random testing for java card appletsSPIN2010Kari Kähkönen, Roland Kindermann, Keijo Heljanko, Ilkka Niemelä
Toward Automated Detection of Logic Vulnerabilities in Web ApplicationsUSENIX Security2010Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
Dynamic symbolic database application testingWorkshop on Testing Database Systems2010Chengkai Li, Christoph Csallner
Reggae: Automated Test Generation for Programs Using Complex Regular ExpressionsASE2009Nuo Li, Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte
Looper: Lightweight Detection of Infinite Loops at RuntimeASE2009Jacob Burnim, Nicholas Jalbert, Christos Stergiou, Koushik Sen
Reducing Test Inputs Using Information PartitionsCAV2009
Symbolic Query ExplorationFormal Methods and Software Engineering2009Margus Veanes, Pavel Grigorenko, Peli Halleux, Nikolai Tillmann
Sireum/Topi LDP: a lightweight semi-decision procedure for optimizing symbolic execution-based analysesFSE2009Jason Belt, Robby, Xianghua Deng
Darwin: an approach for debugging evolving programsFSE2009Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani
Symbolic Query ExplorationICFEM2009
Event Listener Analysis and Symbolic Execution for Testing GUI ApplicationsICFEM2009Svetoslav R. Ganov, Chip Killmar, Sarfraz Khurshid, Dewayne E. Perry
WISE: Automated test generation for worst-case complexityICSE2009Jacob Burnim, Sudeep Juvekar, Koushik Sen
Automatic creation of SQL Injection and cross-site scripting attacksICSE2009Adam Kieyzun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst
Euclide: A Constraint-Based Testing Framework for Critical C ProgramsICST2009Arnaud Gotlieb
Fitness-guided path exploration in dynamic symbolic executionInternational Conference on Dependable Systems and Networks2009
Discovering Application-Level Insider Attacks Using Symbolic ExecutionInternational Information Security Conference2009
Precise pointer reasoning for dynamic test generationISSTA2009Bassem Elkarablieh, Patrice Godefroid, Michael Y. Levin
HAMPI: a solver for string constraintsISSTA2009Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter Hooimeijer, Michael D. Ernst
Precise interface identification to improve testing and analysis of web applicationsISSTA2009William G.J. Halfond, Saswat Anand, Alessandro Orso
Loop-extended symbolic execution on binary programsISSTA2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic ExecutionNetwork and Distributed System Security Symposium2009Tielei Wang, Tao Wei, Zhiqiang Lin, Wei Zou
Cloud9: a software testing serviceOperating Systems Review2009
Snugglebug: a powerful approach to weakest preconditionsPLDI2009
Symbolic Robustness AnalysisRTSS2009Rupak Majumdar, Indranil Saha
State Joining and Splitting for the Symbolic Execution of BinariesRuntime Verification2009Trevor Hansen, Peter Schachte, Harald Søndergaard
Efficient Testing of Concurrent Programs with Abstraction-Guided Symbolic ExecutionSPIN2009
A survey of new trends in symbolic execution for software testing and analysisSTTT2009Corina S. Păsăreanu, Willem Visser
Symbolic execution with abstractionSTTT2009Saswat Anand, Corina S. Păsăreanu, Willem Visser
Test Input Generation for Programs with PointersTACAS2009Dries Vanoverberghe, Nikolai Tillmann, Frank Piessens
TACAS2009Path Feasibility Analysis for String-Manipulating Programs
Dynamic Test Generation To Find Integer Bugs in x86 Binary Linux ProgramsUSENIX Security Symposium2009David Molnar, Xue Cong Li, David A. Wagner
Selective Symbolic ExecutionWorkshop on Hot Topics in System Dependability2009V. Chipounov, V. Georgescu, C. Zamfir, and G. Candea
EXE: Automatically Generating Inputs of DeathACM Trans. Inf. Syst. Secur.2008
Test-Suite Augmentation for Evolving SoftwareASE2008
Heuristics for Scalable Dynamic Test GenerationASE2008
Context-Sensitive Relevancy Analysis for Efficient Symbolic ExecutionAsian Symposium on Programming Languages and Systems2008
Better bug reporting with better privacyASPLOS2008
Automatically Identifying Trigger-based Behavior in MalwareBotnet Detection2008David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin
Randomized directed testing (REDIRECT) for Simulink/Stateflow modelsEMSOFT2008Manoranjan Satpathy, Anand Yeolekar, S. Ramesh
Differential symbolic executionFSE2008
DySy: dynamic symbolic execution for invariant inferenceICSE2008
Calysto: scalable and precise extended static checkingICSE2008
Active property checkingInternational conference on Embedded software2008
Pex-White Box Test Generation for .NETInternational Conf. on Tests and Proofs2008
Dynamic Test Input Generation for Web ApplicationsISSTA2008
Universal symbolic execution and its application to likely data structure invariant generationISSTA2008
Dynamic test input generation for web applicationsISSTA2008
Combining unit-level symbolic execution and system-level concrete execution for testing NASA softwareISSTA2008
Automated Whitebox Fuzz TestingNetwork and Distributed System Security Symposium2008
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems ProgramsOSDI2008
Grammar-based whitebox fuzzingPLDI2008
Using Dynamic Symbolic Execution to Improve Deductive VerificationSPIN2008
RWset: Attacking Path Explosion in Constraint-Based Test GenerationTACAS2008
Demand-Driven Compositional Symbolic ExecutionTACAS2008
Combining symbolic execution with model checking to verify parallel numerical programsTOSEM2008
Vigilante: End-to-End Containment of Internet Worm EpidemicsTransactions on Computer Systems2008
Panalyst: privacy-aware remote error analysis on commodity softwareUSENIX Security Symposium2008
A Decision Procedure for Bitvectors and ArraysCAV2007Ganesh and Dill
Directed test generation using symbolic grammarsASE2007
Creating Vulnerability Signatures Using Weakest PreconditionsComputer Security Foundations Symposium2007
Predictive testing: amplifying the effectiveness of software testingESEC/FSE2007
Hybrid Concolic TestingICSE2007
Variably interprocedural program analysis for runtime error detectionISSTA2007
Dynamic test input generation for database applicationsISSTA2007
Compositional dynamic test generationPOPL2007
QAGen: generating query-aware test databasesSIGMOD Conf.2007Carsten Binnig, Donald Kossmann, Eric Lo, M. Tamer Özsu
Bouncer: securing software by blocking bad inputSOSP2007
Exploring Multiple Execution Paths for Malware AnalysisSymposium on Security and Privacy2007
JPF-SE: A Symbolic Execution Extension to Java PathFinderTACAS2007Saswat Anand, Corina Pasareanu, Willem Visser
Type-Dependence Analysis and Program Transformation for Symbolic ExecutionTACAS2007Saswat Anand, Alex Orso, Mary Jean Harrold
BitScope: Automatically Dissecting Malicious BinariesTechnical Report CMU-CS-07-133, School of Computer Science, Carnegie Mellon University2007
Saturn: A scalable framework for error detection using Boolean satisfiabilityTOPLAS2007
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationUSENIX Security Symposium2007David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, Dawn Song
EXE: Automatically Generating Inputs of DeathCCS2006Cadar, Ganesh, Pawlowski, Dill, Engler
Bogor/Kiasan: A k-bounded Symbolic Execution for Checking Strong Heap Properties of Open SystemsASE2006Xianghua Deng, Jooyong Lee, Robby
Temporal search: detecting hidden malware timebombs with virtual machinesASPLOS2006Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking ToolsCAV2006Koushik Sen, Gul Agha
Test input generation for java containers using state matchingISSTA2006Willem Visser, Corina S. Pasareanu, Radek Pelánek
Symbolic Execution with Abstract Subsumption CheckingModel Checking Software, International SPIN Workshop2006Saswat Anand, Corina S. Pasareanu, Willem Visser
Symbolic execution of floating-point computationsSoftware Testing, Verification & Reliability2006Bernard Botella, Arnaud Gotlieb, Claude Michel
Automatically Generating Malicious Disks using Symbolic ExecutionSymposium on Security and Privacy2006Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler
MATRIX: Maintenance-Oriented Testing Requirements Identifier and ExaminerTAIC PART2006Taweesup Apiwattanapong, Raúl A. Santelices, Pavan Kumar Chittimalli, Alessandro Orso, Mary Jean Harrold
Test input generation for red-black trees using abstractionASE2005Willem Visser, Corina S. Pasareanu, Radek Pelánek
CUTE: a concolic unit testing engine for CFSE2005Koushik Sen, Darko Marinov, Gul Agha
Generalizing symbolic execution to library classesPASTE2005Sarfraz Khurshid, Yuk Lai Suen
DART: directed automated random testingPLDI2005Patrice Godefroid, Nils Klarlund, Koushik Sen
Execution Generated Test Cases: How to Make Systems Code Crash ItselfSPIN2005Cristian Cadar, Dawson R. Engler
Symstra: A Framework for Generating Object-Oriented Unit Tests Using Symbolic ExecutionTACAS2005Tao Xie, Darko Marinov, Wolfram Schulte, David Notkin
Automating mimicry attacks using static binary analysisUSENIX Security Symposium2005Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
Test input generation with java PathFinderISSTA2004Willem Visser, Corina S. Păsăreanu, Sarfraz Khurshid
Verification of Java Programs Using Symbolic Execution and Invariant GenerationModel Checking Software, International SPIN Workshop2004Corina S. Păsăreanu, Willem Visser
Bogor: an extensible and highly-modular software model checking frameworkFSE2003Robby, Matthew B. Dwyer, John Hatcliff
Generalized Symbolic Execution for Model Checking and TestingTACAS2003Sarfraz Khurshid, Corina S. Păsăreanu, Willem Visser
Extended Static Checking for JavaPLDI2002Cormac Flanagan, K. Rustan M. Leino, Mark Lillibridge, Greg Nelson, James B. Saxe, Raymie Stata
Bandera: a source-level interface for model checking Java programsICSE2000James C. Corbett, Matthew B. Dwyer, John Hatcliff, Robby
Symbolic Testing and the DISSECT Symbolic Evaluation SystemIEEE Tran. Software Engg.1977William E. Howden
Symbolic Execution and Program TestingCommun. ACM1976James C. King