Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- International Symposium on Formal Methods (FM)
also: Workshop on Uses of Symbolic Execution (USE @ FM)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 989 matches
- 2024
- Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet:
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. J. Cryptogr. Eng. 14(1): 147-164 (2024) - Conrad Zimmerman, Jenna DiVincenzo, Jonathan Aldrich:
Sound Gradual Verification with Symbolic Execution. Proc. ACM Program. Lang. 8(POPL): 2547-2576 (2024) - Zhenbang Chen, Guofeng Zhang, Zehua Chen, Ziqi Shuai, Weiyu Pan, Yufeng Zhang, Ji Wang:
Adaptive solving strategy synthesis for symbolic execution. J. Softw. Evol. Process. 36(4) (2024) - Ismet Burak Kadron, Yannic Noller, Rohan Padhye, Tevfik Bultan, Corina S. Pasareanu, Koushik Sen:
Fuzzing, Symbolic Execution, and Expert Guidance for Better Testing. IEEE Softw. 41(1): 98-104 (2024) - Jianqi Shi, Yinghao Chen, Qin Li, Yanhong Huang, Yang Yang, Mengyan Zhao:
Automated Test Cases Generator for IEC 61131-3 Structured Text Based Dynamic Symbolic Execution. IEEE Trans. Computers 73(4): 1048-1059 (2024) - Arpita Dutta, Rasool Maghareh, Joxan Jaffar, Sangharatna Godboley, Xiao Liang Yu:
TracerX: Pruning Dynamic Symbolic Execution with Deletion and Weakest Precondition Interpolation (Competition Contribution). FASE 2024: 320-325 - Aleksandr Misonizhnik, Sergey Morozov, Yurii Kostyukov, Vladislav Kalugin, Aleksei Babushkin, Dmitry Mordvinov, Dmitry Ivanov:
KLEEF: Symbolic Execution Engine (Competition Contribution). FASE 2024: 314-319 - Guofeng Zhang, Ziqi Shuai, Kelin Ma, Kunlin Liu, Zhenbang Chen, Ji Wang:
FDSE: Enhance Symbolic Execution by Fuzzing-based Pre-Analysis (Competition Contribution). FASE 2024: 304-308 - Martin Jonás, Kristián Kumor, Jakub Novák, Jindrich Sedlácek, Marek Trtík, Lukás Zaoral, Paulína Ayaziová, Jan Strejcek:
Symbiotic 10: Lazy Memory Initialization and Compact Symbolic Execution - (Competition Contribution). TACAS (3) 2024: 406-411 - Nils Loose, Felix Mächtle, Florian Sieck, Thomas Eisenbarth:
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution). TACAS (3) 2024: 399-405 - Zhen Wang, Zhenbang Chen:
AISE: A Symbolic Verifier by Synergizing Abstract Interpretation and Symbolic Execution (Competition Contribution). TACAS (3) 2024: 347-352 - 2023
- Malte Mues:
The integration of multi-color taint-analysis with dynamic symbolic execution for Java web application security analysis. Technical University of Dortmund, Germany, 2023 - Sandro Grebant:
Efficient tree-based symbolic WCET computation. (Calcul efficace du pire temps d'exécution symbolique à base d'arbres). University of Lille, France, 2023 - Koki Nakamura, Kosuke Sekiyama:
Robot Symbolic Motion Planning and Task Execution Based on Mixed Reality Operation. IEEE Access 11: 112753-112763 (2023) - Henrique Botelho Guerra, João F. Ferreira, João Costa Seco:
Hoogle⋆: Constants and λ-abstractions in Petri-net-based Synthesis using Symbolic Execution (Artifact). Dagstuhl Artifacts Ser. 9(2): 20:1-20:3 (2023) - Frederico Ramos, Nuno Sabino, Pedro Adão, David A. Naumann, José Fragoso Santos:
Toward Tool-Independent Summaries for Symbolic Execution (Artifact). Dagstuhl Artifacts Ser. 9(2): 07:1-07:4 (2023) - Sara Baradaran, Mahdi Heidari, Ali Kamali, Maryam Mouzarani:
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes. Int. J. Inf. Sec. 22(5): 1277-1290 (2023) - Sören Tempel, Vladimir Herdt, Rolf Drechsler:
Specification-Based Symbolic Execution for Stateful Network Protocol Implementations in IoT. IEEE Internet Things J. 10(11): 9544-9555 (2023) - Elson Kurian, Daniela Briola, Pietro Braione, Giovanni Denaro:
Automatically generating test cases for safety-critical software via symbolic execution. J. Syst. Softw. 199: 111629 (2023) - Nan Jiang, Zichen Wang, Jian Wang:
Quantum symbolic execution. Quantum Inf. Process. 22(10): 389 (2023) - José Cabrero-Holgueras, Sergio Pastrana:
HEFactory: A symbolic execution compiler for privacy-preserving Deep Learning with Homomorphic Encryption. SoftwareX 22: 101396 (2023) - Yue Sun, Zhi Li, Shichao Lv, Limin Sun:
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE Trans. Dependable Secur. Comput. 20(6): 4502-4518 (2023) - Nenghui Hu, Zheng Bian, Ziqi Shuai, Zhenbang Chen, Yufeng Zhang:
Symbolic Execution of MPI Programs with One-Sided Communications. APSEC 2023: 657-658 - Ziqi Shuai, Zhenbang Chen, Yufeng Zhang, Hengbiao Yu, Ji Wang:
Unsatisfiable Core Based Constraint Solving Cache in Symbolic Execution. APSEC 2023: 661-662 - Meng Wang, Weiliang Fei, Miao Wang, Jin Cui:
Reinforcement Learning Guided Symbolic Execution for Ethereum Smart Contracts. APSEC 2023: 91-100 - Soha Hussein, Stephen McCamant, Elena Sherman, Vaibhav Sharma, Mike Whalen:
Structural Test Input Generation for 3-Address Code Coverage Using Path-Merged Symbolic Execution. AST 2023: 79-89 - Shibo Tang, Jiacheng Zhu, Yifei Gao, Jing Zhou, Dejun Mu, Wei Hu:
Verifying RISC-V Privilege Transition Integrity Through Symbolic Execution. ATS 2023: 1-6 - Mahtab Norouzi, Mounir Elgharabawy, Kaiwen Zhang:
The Greed Trap: Uncovering Intrinsic Ethereum Honeypots Through Symbolic Execution. BCCA 2023: 440-447 - Qiping Wei, Fadul Sikder, Huadong Feng, Yu Lei, Raghu Kacker, D. Richard Kuhn:
SmartExecutor: Coverage-Driven Symbolic Execution Guided by a Function Dependency Graph. BRAINS 2023: 1-8 - Pansilu Pitigalaarachchi, Xuhua Ding, Haiqing Qiu, Haoxin Tu, Jiaqi Hong, Lingxiao Jiang:
KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis. CCS 2023: 2009-2023
skipping 959 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 17:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint