KLEE

Version 3.0

Publications

Publications and Systems Using KLEE

Below you can find a list of 250+ papers and systems that either use or extend KLEE. They are listed in chronological order.

We regularly organise workshops to discuss ideas and new applications. Additional information about systems and research based on KLEE can be found on the accompanying websites:

If you have used or extended KLEE and would like to have your paper listed here, please open a pull request at https://github.com/klee/klee.github.io/pulls. Alternatively, email klee-dev-owner or c.cadar@imperial.ac.uk. Artifacts published at Zenodo can also be registered with the Symbolic Execution community.

  1. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
    Cristian Cadar, Daniel Dunbar, Dawson Engler
    USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008)
    December 8-10, 2008, San Diego, CA, USA

  2. HAMPI: A Solver for String Constraints
    Adam Kiezun, Vijay Ganesh, Philip Guo, Pieter Hooimeijer, Michael Ernst
    ACM International Symposium on Software Testing and Analysis (ISSTA 2009)
    July 19-23, 2009, Chicago, IL, USA

  3. Server-side Verification of Client Behavior in Online Games
    Darrell Bethea, Robert Cochran, Michael Reiter
    Network and Distributed System Security Symposium (NDSS 2010)
    February 28 - March 3, 2010, San Diego, CA, USA

  4. KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment
    Raimondas Sasnauskas, Olaf Landsiedel, Muhammad Hamad Alizai, Carsten Weise, Stefan Kowalewski, Klaus Wehrle
    ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
    April 12-16, 2010, Stockholm, Sweden
    KleeNet is available here.

  5. Execution Synthesis: A Technique for Automated Software Debugging
    Cristian Zamfir, George Candea
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2010)
    April 13-16, 2010, Paris, France

  6. Reverse Engineering of Binary Device Drivers with RevNIC
    Vitaly Chipounov, George Candea
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2010)
    April 13-16, 2010, Paris, France

  7. Testing Closed-Source Binary Device Drivers with DDT
    Volodymyr Kuznetsov, Vitaly Chipounov, George Candea
    USENIX Annual Technical Conference (USENIX ATC 2010)
    June 22-25, 2010, Boston, MA, USA

  8. Stable Deterministic Multithreading through Schedule Memoization
    Heming Cui, Jingyue Wu, Chia-che Tsai, Junfeng Yang
    USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010)
    October 4-6, 2010, Vancouver, BC, Canada

  9. AEG: Automatic Exploit Generation
    Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley
    Network and Distributed System Security Symposium (NDSS 2011)
    February 6-9, 2011, San Diego, CA, USA

  10. Howard: A Dynamic Excavator for Reverse Engineering Data Structures
    Asia Slowinska, Traian Stancescu, Herbert Bos
    Network and Distributed System Security Symposium (NDSS 2011)
    February 6-9, 2011, San Diego, CA, USA

  11. Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations
    Ricardo Corin, Felipe Andrés Manzano
    International Symposium on Engineering Secure Software and Systems (ESSoS 2011)
    February 9-10, 2011, Madrid, Spain

  12. S2E: A Platform for In Vivo Multi-Path Analysis of Software Systems
    Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
    International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2011)
    March 5-11, 2011, Newport Beach, CA
    S2E is available at EPFL and GitHub.

  13. Parallel Symbolic Execution for Automated Real-World Software Testing
    Stefan Bucur, Vlad Ureche, Cristian Zamfir, George Candea
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2011)
    April 10-13, 2011, Salzburg, Austria
    Cloud9 is available here.

  14. Symbolic Crosschecking of Floating-Point and SIMD Code
    Peter Collingbourne, Cristian Cadar, Paul H. J. Kelly
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2011)
    April 10-13, 2011, Salzburg, Austria

  15. Scalable Symbolic Execution of Distributed Systems
    Raimondas Sasnauskas, Oscar Dustmann, Benjamin Lucien Kaminski, Carsten Weise, Stefan Kowalewski, Klaus Wehrle
    IEEE International Conference on Distributed Computing Systems (ICDCS 2011)
    June 20-24, 2011, Minneapolis, MN, USA

  16. KLOVER: A Symbolic Execution and Automatic Test Generation Tool for C++ Programs
    Guodong Li, Indradeep Ghosh, Sreeranga Rajan
    International Conference on Computer Aided Verification (CAV 2011)
    July 14-20, 2011, Cliff Lodge, Snowbird, UT, USA

  17. Practical, Low-Effort Equivalence Verification of Real Code
    David Ramos, Dawson Engler
    International Conference on Computer Aided Verification (CAV 2011)
    July 16-20, 2011, Snowbird, UT, USA

  18. Selecting Peers for Execution Comparison
    William N. Sumner, Tao Bao, Xiangyu Zhang
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2011)
    July 17-21, 2011, Toronto, CA

  19. Directed Symbolic Execution
    Kin-Keung Ma, Khoo Yit Phang, Jeffrey S. Foster, Michael Hicks
    International Conference on Static Analysis (SAS 2011)
    September 14-16, 2011, Venice, Italy

  20. Efficient Deterministic Multithreading through Schedule Relaxation
    Heming Cui, Jingyue Wu, John Gallagher, Huayang Guo, Junfeng Yang
    ACM Symposium on Operating Systems Principles (SOSP 2011)
    October 23-26, 2011, Cascais, Portugal

  21. SEEP: Exploiting Symbolic Execution for Energy-aware Programming
    Timo Hönig, Christopher Eibel, Rüdiger Kapitza, Wolfgang Schröder-Preikschat
    ACM SIGOPS Operating Systems Review, Volume 45, Issue 3
    December 2011

  22. Symbolic Testing of OpenCL Code
    Peter Collingbourne, Cristian Cadar, Paul H. J. Kelly
    Haifa Verification Conference (HVC 2011)
    December 6-8, 2011, Haifa, Israel

  23. GKLEE: Concolic Verification and Test Generation for GPUs
    Guodong Li, Peng Li, Geof Sawaya, Ganesh Gopalakrishnan, Indradeep Ghosh, Sreeranga P. Rajan
    ACM Symposium on Principles and Practice of Parallel Programming (PPoPP 2012)
    February 25-29, 2012, New Orleans, LA, USA
    GKLEE is available here.

  24. Data Races vs. Data Race Bugs: Telling the Difference with Portend
    Baris Kasikci, Cristian Zamfir, George Candea
    ACM SIGPLAN Notices, Volume 47, Issue 4
    March 2012

  25. Staged Symbolic Execution
    Junaid Haroon Siddiqui, Sarfraz Khurshid
    ACM Symposium on Applied Computing (SAC 2012)
    March 26-30, 2012, Trento, Italy

  26. Scalable Testing of File System Checkers
    João Carlos Menezes Carreira, Rodrigo Rodrigues, George Candea, Rupak Majumdar
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2012)
    April 10-13, 2012, Bern, Switzerland

  27. make test-zesti: A Symbolic Execution Solution for Improving Regression Testing
    Paul Dan Marinescu, Cristian Cadar
    ACM/IEEE International Conference on Software Engineering (ICSE 2012)
    June 2-9, 2012, Zurich, Switzerland
    ZESTI is available here.

  28. BugRedux: Reproducing Field Failures for In-House Debugging
    Wei Jin, Alessandro Orso
    ACM/IEEE International Conference on Software Engineering (ICSE 2012)
    June 2-9, 2012, Zurich, Switzerland
    BugRedux is available here.

  29. Industrial Application of Concolic Testing Approach: A Case Study on libexif by Using CREST-BV and KLEE
    Yunho Kim, Moonzoo Kim, YoungJoo Kim, Yoonkyu Jang
    ACM/IEEE International Conference on Software Engineering (ICSE 2012)
    June 2-9, 2012, Zurich, Switzerland

  30. Efficient State Merging in Symbolic Execution
    Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, George Candea
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012)
    June 11-16, 2012, Beijing, China

  31. Noninterference via Symbolic Execution
    Dimiter Milushev, Wim Beck, Dave Clarke
    In: Giese H., Rosu G. (eds) Formal Techniques for Distributed Systems. Lecture Notes in Computer Science, vol 7273. Springer, Berlin, Heidelberg (FMOODS/FORTE 2012)
    June 13-16, 2012, Stockholm, Sweden

  32. CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations
    Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Chung-Wei Lai, Han-Lin Lu, Wai-Meng Leong
    International Conference on Software Security and Reliability (SERE 2012)
    June 20-22, 2012, Gaithersburg, USA

  33. High-Coverage Symbolic Patch Testing
    Paul Dan Marinescu, Cristian Cadar
    International SPIN Workshop on Model Checking of Software (SPIN 2012)
    July 23-24, 2012, Oxford, UK

  34. Checking Properties Described by State Machines: On Synergy of Instrumentation, Slicing, and Symbolic Execution
    Jiri Slaby, Jan Strejcek, Marek Trtík
    International Workshop on Formal Methods for Industrial Critical Systems (FMICS 2012)
    August 27-28, 2012, Paris, France

  35. SymDrive: Testing Drivers without Devices
    Matthew J. Renzelmann, Asim Kadav, Michael M. Swift
    USENIX Symposium on Operating Systems Design and Implementation (OSDI 2012)
    October 8-10, 2012, Hollywood, USA

  36. Scaling Symbolic Execution Using Ranged Analysis
    Junaid Haroon Siddiqui, Sarfraz Khurshid
    ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012)
    October 19-26, 2012, Tucson, Arizona, USA

  37. Detecting Problematic Message Sequences and Frequencies in Distributed Systems
    Charles Lucas, Sebastian Elbaum, David S. Rosenblum
    ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012)
    October 19-26, 2012, Tucson, USA

  38. Taint Analysis of Security Code in the KLEE Symbolic Execution Engine
    Ricardo Corin, Felipe Andrés Manzano
    International Conference on Information and Communications Security (ICICS 2012)
    October 29-31, 2012, Hong Kong, China

  39. Enhancing Symbolic Execution to Test the Compatibility of Re-engineered Industrial Software
    Susumu Tokumoto, Tadahiro Uehara, Kazuki Munakata, Haruyuki Ishida, Toru Eguchi, Masafumi Baba
    Asia-Pacific Software Engineering Conference (APSEC 2012)
    December 4-7, 2012, Hong Kong, China

  40. A SOFT Way for OpenFlow Switch Interoperability Testing
    Maciej Kuzniar, Peter Peresini, Marco Canini, Daniele Venzano, Dejan Kostic
    ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2012)
    December 10-13, 2012, Nice, France

  41. Symbolic Simulation for Debugging and Analysis of REKO Models Using KLEE
    Marta Vicente Romero
    Master Thesis, Luleå University of Technology
    2013, Luleå, Sweden

  42. Automatic Detection of Floating-Point Exceptions
    Peter C. Rigby, Earl T. Barr, Christian Bird, Premkumar Devanbu, Daniel M. German
    ACM Symposium on Principles of Programming Languages (POPL 2013)
    January 23-25, 2013, Rome, Italy

  43. Verifying Systems Rules Using Rule-Directed Symbolic Execution
    Heming Cui, Gang Hu, Jingyue Wu, Junfeng Yang
    International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2013)
    March 16-20, 2013, Houston, USA
    Woodpecker is available here.

  44. Symbiotic: Synergy of Instrumentation, Slicing, and Symbolic Execution (Competition Contribution)
    Jiri Slaby, Jan Strejcek, Marek Trtík
    International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013)
    March 16-24, 2013, Rome, Italy
    Symbiotic is available here.

  45. SemFix: Program Repair via Semantic Analysis
    Hoang Duong Thien Nguyen, Dawei Qi, Abhik Roychoudhury, Satish Chandra
    ACM/IEEE International Conference on Software Engineering (ICSE 2013)
    May 18-26, 2013, San Francisco, CA, USA

  46. Post-silicon Conformance Checking with Virtual Prototypes
    Li Lei, Fei Xie, Kai Cong
    Design Automation Conference (DAC 2013)
    June 1-5, 2013, San Francisco, CA, USA

  47. CLAP: Recording Local Executions to Reproduce Concurrency Failures
    Jeff Huang, Charles Zhang, Julian Dolby
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013)
    June 16-22, 2013, Seattle, WA, USA

  48. CRAXweb: Automatic Web Application Testing and Attack Generation
    Shih-Kun Huang, Han-Lin Lu, Wai-Meng Leong, Huan Liu
    International Conference on Software Security and Reliability (SERE 2013)
    June 18-20, 2013, Gaithersburg, USA

  49. Redundant State Detection for Dynamic Symbolic Execution
    Suhabe Bugrara, Dawson Engler
    USENIX Annual Technical Conference (USENIX ATC 2013)
    June 26-28, 2013, San Jose, California

  50. Expression Reduction from Programs in a Symbolic Binary Executor
    Anthony Romano, Dawson Engler
    International SPIN Workshop on Model Checking (SPIN 2013)
    July 8-9, Stomy Brook, USA

  51. Regression Verification Using Impact Summaries
    John Backes, Suzette Person, Neha Rungta, Oksana Tkachuk
    International SPIN Workshop on Model Checking (SPIN 2013)
    July 8-9, Stomy Brook, USA

  52. Multi-solver Support in Symbolic Execution
    Hristina Palikareva, Cristian Cadar
    International Conference on Computer Aided Verification (CAV 2013)
    July 13-19, 2013, St Petersburg, Russia
    KLEE-Multisolver is available here.

  53. F3: Fault Localization for Field Failures
    Wei Jin, Alessandro Orso
    International Symposium on Software Testing and Analysis (ISSTA 2013)
    July 15-20, 2013, Lugano, Switzerland

  54. Symbolic Execution of Virtual Devices
    Kai Cong, Fei Xie, Li Lei
    International Conference on Quality Software (QSIC 2013)
    July 29-30, 2013, Najing, China

  55. FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution
    Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart
    USENIX Security Symposium (Security 2013)
    August 14–16, 2013, Washington, D.C., USA

  56. Sleuth: Automated Verification of Software Power Analysis Countermeasures
    Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne
    Conference on Cryptographic Hardware and Embedded Systems (CHES 2013)
    August 18-22, 2013, Santa Barbara, USA

  57. KATCH: High-Coverage Testing of Software Patches
    Paul Dan Marinescu, Cristian Cadar
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2013)
    August 18-26, 2013, St Petersburg, Russia

  58. Symbolic Software Model Validation
    Cynthia Sturton, Rohit Sinha, Thurston H.Y. Dang, Sakshi Jain, Michael McCoyd, Wei Yang Tan, Petros Maniatis, Sanjit A. Seshia, David Wagner
    ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCON 2013)
    October 18-20, 2013, Portland, USA

  59. Steering Symbolic Execution to Less Traveled Paths
    You Li, Zhendong Su, Linzhang Wang, Xuandong Li
    ACM SIGPLAN International Conference on Object Oriented Programming, Systems, Languages, and Applications (OOPSLA 2013)
    October 26-31, 2013, Indianapolis, USA

  60. Lazy Symbolic Execution through Abstraction and Sub-space Search
    Guodong Li, Indradeep Ghosh
    Haifa Verification Conference (HVC 2013)
    November 5-7, 2013, Haifa, Israel

  61. Modeling Firmware as Service Functions and Its Application to Test Generation
    Sunha Ahn, Sharad Malik
    Haifa Verification Conference (HVC 2013)
    November 5-7, 2013, Haifa, Israel

  62. Chaining Test Cases for Reactive System Testing
    Peter Schrammel, Tom Melham, Daniel Kroening
    IFIP International Conference on Testing Software and Systems (ICTSS 2013)
    November 13-15, 2013, Istanbul, Turkey

  63. Automatic Concolic Test Generation with Virtual Prototypes for Post-silicon Validation
    Kai Cong, Fei Xie, Li Lei
    IEEE/ACM International Conference on Computer-aided Design (ICCAD 2013)
    November 18-21, 2013, San Jose, CA, USA

  64. Static Analysis Driven Cache Performance Testing
    Abhijeet Banerjee, Sudipta Chattopadhyay, Abhik Roychoudhury
    IEEE Real-Time Systems Symposium (RTSS 2013)
    December 3-6, 2013, Vancouver, CA

  65. Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares
    Jonas Zaddach, Luca Bruno, Aurelien Francillon, Davide Balzarotti
    Network and Distributed System Security Symposium (NDSS 2014)
    February 23-36, 2014, San Diego, USA
    Avatar is available here.

  66. Conflict-Driven Symbolic Execution
    Celina Gomes do Val
    Master Thesis, University of British Columbia
    March 2014, Vancouver, CA
    KITE is available here.

  67. Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections
    Marie-Laure Potet, Laurent Mounier, Maxime Puys, Louis Dureuil
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2014)
    March 31 - April 4, 2014, Cleveland, USA

  68. Reproducing Field Failures for Programs with Complex Grammar-Based Input
    Fitsum Meshesha Kifetew, Wei Jin, Roberto Tiella, Alessandro Orso, Paolo Tonella
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2014)
    March 31 - April 4, 2014, Cleveland, USA

  69. Automated Testcase Generation for Numerical Support Functions in Embedded Systems
    Johann Schumann, Stefan-Alexander Schneider
    International Symposium on NASA Formal Methods (NFM 2014)
    April 29 - May 1, 2014, Houston, TX, USA

  70. CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution Chao Chun Yeh, Han Lin Lu, Chun Yen Chen, Kee Kiat Khor, Shih Kun Huang
    IEEE International Conference on Software Security and Reliability (SERE 2014 Companion)
    June 30 - July 2, 2014, San Francisco, USA

  71. Using Test Case Reduction and Prioritization to Improve Symbolic Execution
    Chaoqiang Zhang, Alex Groce, Mohammad Amin Alipour
    July 21-25, 2014, San Jose, USA

  72. Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study
    Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
    IEEE International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA 2014)
    August 25-26, 2014, Hong Kong, China

  73. 8Cage: Lightweight Fault-based Test Generation for Simulink
    Dominik Holling, Alexander Pretschner, Matthias Gemmar
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)
    September 15-19, 2014, Vasteras, Sweden

  74. Docovery: Toward Generic Automatic Document Recovery
    Tomasz Kuchta, Cristian Cadar, Miguel Castro, Manuel Costa
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)
    September 15-19, 2014, Vasteras, Sweden
    Docovery is available here.

  75. Incremental Symbolic Execution for Automated Test Suite Maintenance
    Sarmad Makhdoom, Muhammad Adeel Khan, Junaid Haroon Siddiqui
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)
    September 15-19, 2014, Vasteras, Sweden

  76. symMMU: Symbolically Executed Runtime Libraries for Symbolic Memory Access
    Anthony Romano, Dawson R. Engler
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)
    September 15-19, 2014, Vasteras, Sweden

  77. Control Flow Obfuscation using Neural Network to Fight Concolic Testing
    Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin GAO, Chunfu Jia
    International Conference on Security and Privacy in Communication Networks (SecureComm 2014)
    September 24-26, 2014, Beijing, China

  78. Automated Software Testing of Memory Performance in Embedded GPUs
    Sudipta Chattopadhyay, Petru Eles, Zebo Peng
    International Conference on Embedded Software (EMSOFT 2014)
    October 12-17, 2014, Jaypee Greens, India

  79. Symbolic Execution of Multithreaded Programs from Arbitrary Program Contexts
    Tom Bergan, Dan Grossman, Luis Ceze
    ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2014)
    October 20-24, 2014, Portland, USA

  80. A Comparative Study of Incremental Constraint Solving Approaches in Symbolic Execution
    Tianhai Liu, Mateus Araújo, Marcelo d’Amorim, Mana Taghdiri
    Haifa Verification Conference (HVC 2014)
    November 18-20, 2014, Haifa, Israel

  81. Synchronization Error Detection of MPI Programs by Symbolic Execution
    Xianjin Fu, Zhenbang Chen, Chun Huang, Wei Dong, Ji Wang
    Asia-Pacific Software Engineering Conference (APSEC 2014)
    December 1-4, 2014, Jeju, South Korea

  82. Methods for Binary Symbolic Execution
    Anthony Romano
    Dissertation, Stanford University, Department of Computer Science
    December 2014, Stanford, USA

  83. MPISE: Symbolic Execution of MPI Programs
    Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong, Ji Wang
    IEEE International Symposium on High Assurance Systems Engineering (HASE 2014)
    January 8-10, 2015, Daytona, USA

  84. The BORG: Nanoprobing Binaries for Buffer Overreads
    Matthias Neugschwandtner, Paolo Milani Comparetti, Istvan Haller, Herbert Bos
    ACM Conference on Data and Application Security and Privacy (CODASPY 2015)
    March 2-4, 2015, San Antonio, USA

  85. Postconditioned Symbolic Execution
    Qiuping Yi, Zijiang Yang, Shengjian Guo, Chao Wang, Jian Liu, Chen Zhao
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2015)
    April 13-17, 2015, Graz, Austria

  86. Generating Succinct Test Cases Using Don’t Care Analysis
    Cuong Nguyen, Hiroaki Yoshida, Mukul Prasad, Indradeep Ghosh, Koushik Sen
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2015)
    April 13-17, 2015, Graz, Austria

  87. Automated Classification of Data Races Under Both Strong and WeakMemory Models
    Baris Kasikci, Cristian Zamfir, George Candea
    ACM Transactions on Programming Languages and Systems, Volume 37, Issue 3 (TOPLAS)
    May 2015

  88. The Use of Symbolic Execution for Testing of Real-Time Safety-Related Software
    Martin Hořeňovský
    Bachelor Thesis, Czech Technical University in Prague
    May 2015, Prague, CZ

  89. Analyzing Protocol Implementations for Interoperability
    Luis Pedrosa, Ari Fogel, Nupur Kothari, Ramesh Govindan, Ratul Mahajan, Todd Millstein
    USENIX Symposium on Networked Systems Design and Implementation (NSDI 2015)
    May 4-6, 2015, Oakland, CA, USA
    PIC is available here.

  90. A Synergistic Analysis Method for Explaining Failed Regression Tests
    Qiuping Yi, Zijiang Yang, Jian Liu, Chen Zhao, Chao Wang
    ACM/IEEE International Conference on Software Engineering (ICSE 2015)
    May 16-24, 2015, Florence, Italy

  91. DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing
    Edmund Wong, Lei Zhang, Song Wang, Taiyue Liu, Lin Tan
    ACM/IEEE International Conference on Software Engineering (ICSE 2015)
    May 16-24, 2015, Florence, Italy

  92. A Framework for Measuring Software Obfuscation Resilience Against Automated Attacks
    Sebastian Banescu, Martin Ochoa, Alexander Pretschner
    International Workshop on Software Protection (SPRO 2015)
    May 17, 2015, Florence, Italy

  93. Explaining Software Failures by Cascade Fault Localization
    Qiuping Yi, Zijiang Yang, Jian Liu, Chen Zhao, Chao Wang
    ACM Transactions on Design Automation of Electronic Systems, Volume 20, Issue 3 (TODAES)
    June, 2015

  94. Experience Report: How is Dynamic Symbolic Execution Different from Manual Testing? - A Study on KLEE
    Xiaoyin Wang, Lingming Zhang, Philip Tanofsky
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2015)
    July 14-17, 2015, Baltimore, USA

  95. Enhancing Reuse of Constraint Solutions to Improve Symbolic Execution
    Xiangyang Jia, Carlo Ghezzi, Shi Ying
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2015)
    July 14-17, 2015, Baltimore, USA

  96. Symbolic Execution for BIOS Security
    Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer
    USENIX Workshop on Offensive Technologies (WOOT 2015)
    August 10-11, 2015, Washington D.C., USA

  97. Under-Constrained Symbolic Execution: Correctness Checking for Real Code
    David A. Ramos, Dawson Engler
    USENIX Security Symposium (Security 2015)
    August 12-14, 2015, Washington D.C., USA

  98. Parallel SMT Solving and Concurrent Symbolic Execution
    Emil Rakadjiev, Taku Shimosawa, Hiroshi Mine, Satoshi Oshima
    IEEE Trustcom/BigDataSE/ISPA 2015
    August 20-22, 2015, Helsinki, Finland

  99. Assertion Guided Symbolic Execution of Multithreaded Programs
    Shengjian Guo, Markus Kusano, Chao Wang, Zijiang Yang, Aarti Gupta
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2015)
    August 30 - September 4, 2015, Bergamo, Italy

  100. TACO: Test Suite Augmentation for Concurrent Programs
    Tingting Yu
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2015)
    August 30 - September 4, 2015, Bergamo, Italy

  101. Parallel Symbolic Execution: Merging In-Flight Requests
    Martin Nowack, Katja Tietze, Christof Fetzer
    Haifa Verification Conference (HVC 2015)
    November 17-19, 2015, Haifa, Israel

  102. Studying the Influence of Standard Compiler Optimizations on Symbolic Execution
    Shiyu Dong, Oswaldo Olivo, Lingming Zhang, Sarfraz Khurshid
    IEEE International Symposium on Software Reliability Engineering (ISSRE 2015)
    November 2-5, 2015, Gaithersbury, MD, USA

  103. Generating High Coverage Tests for SystemC Designs Using Symbolic Execution
    Bin Lin, Zhenkun Yang, Kai Cong, Fei Xie
    Asia and South Pacific Design Automation Conference (ASP-DAC 2016)
    January 25-28, 2016, Macau, China

  104. Profiting from Unit Tests for Integration Testing
    Dominik Holling, Andreas Hofbauer, Alexander Pretschner, Matthias Gemmar
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2016)
    April 11-15, 2016, Chicago, IL, USA

  105. Nequivack: Assessing Mutation Score Confidence
    Dominik Holling, Sebastian Banescu, Marco Probst, Ana Petrovska, Alexander Pretschner
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2016)
    April 11-15, 2016, Chicago, IL, USA

  106. Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis
    Sergey Mechtaev, Jooyong Yi, Abhik Roychoudhury
    ACM/IEEE International Conference on Software Engineering (ICSE 2016)
    May 14-22, 2016, Austin, Texas, USA
    Angelix is available here.

  107. Shadow of a Doubt: Testing for Divergences Between Software Versions
    Hristina Palikareva, Tomasz Kuchta, Cristian Cadar
    ACM/IEEE International Conference on Software Engineering (ICSE 2016)
    May 14-22, 2016, Austin, Texas, USA
    Shadow is available here.

  108. On the Techniques We Create, the Tools We Build, and Their Misalignments: A Study of KLEE
    Eric F. Rizzi, Sebastian Elbaum, Matthew B. Dwyer
    ACM/IEEE International Conference on Software Engineering (ICSE 2016)
    May 14-22, 2016, Austin, Texas, USA

  109. Automatic Generation of High-coverage Tests for RTL Designs Using Software Techniques and Tools
    Yu Zhang, Wenlong Feng, Mengxing Huang
    IEEE Conference on Industrial Electronics and Applications (ICIEA 2016)
    June 5-7, 2016, Hefei, China

  110. Automated Feedback Framework for Introductory Programming Courses
    Jianxiong Gao, Bei Pang, Steven S. Lumetta
    Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE 2016)
    July 11-13, 2016, Arequipa, Peru

  111. BovInspector: Automatic Inspection and Repair of Buffer Overflow Vulnerabilities
    Fengjuan Gao, Lingzhang Wang, Xuandong Li
    IEEE/ACM International conference on Automated Software Engineering (ASE 2016)
    September 3-7, 2016, Singapore, Singapore
    BovInspector is available here.

  112. Conc-iSE: Incremental Symbolic Execution of Concurrent Software
    Shengjian Guo, Markus Kusano, Chao Wang
    IEEE/ACM International conference on Automated Software Engineering (ASE 2016)
    September 3-7, 2016, Singapore, Singapore

  113. MACKE: Compositional Analysis of Low-level Vulnerabilities with Symbolic Execution
    Saahil Ognawala, Martín Ochoa, Alexander Pretschner, Tobias Limmer
    IEEE/ACM International conference on Automated Software Engineering (ASE 2016)
    September 3-7, 2016, Singapore, Singapore

  114. RDE: Replay DEbugging for Diagnosing Production Site Failures
    Peipei Wang, Hiep Nguyen, Xiaohui Gu, Shan Lu
    IEEE Symposium on Reliable Distributed Systems (SRDS 2016)
    September 27-29, 2016, Budapest, Hungary

  115. LLSPLAT: Improving Concolic Testing by Bounded Model Checking
    Min Gao, Lei He, Rupak Majumdar, Zilong Wang
    IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2016)
    October 2-3, 2016, Raleigh, NC, USA

  116. Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis
    Endadul Hoque, Cristina Nita-Rotaru
    IEEE Cybersecurity Development (SecDev 2016)
    November 3-4, 2016, Boston, MA, USA

  117. Hotspot Symbolic Execution of Floating-point Programs
    Minghui Quan
    ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE 2016)
    November 13-18, 2016, Seattle, WA, USA

  118. PIE: Parser Identification in Embedded Systems
    Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti
    Annual Computer Security Applications Conference (ACSAC 2015)
    December 5-9, 2016, Los Angeles, USA

  119. Eliminating Path Redundancy via Postconditioned Symbolic Execution
    Qiuping Yi, Zijiang Yang, Shengjian Guo, Chao Wang, Jian Liu, Chen Zhao
    IEEE Transactions on Software Engineering, Volume 44, Issue 99
    January 26, 2017

  120. Patch-related Vulnerability Detection Based on Symbolic Execution
    Weizhong Qiang, Yuehua Liao, Guozhong Sun, Laurence T. Yang, Deqing Zou, Hai Jin
    IEEE Access, vol. 5, no. 99
    March 1, 2017

  121. Case Study on LLVM as Suitable Intermediate Language for Binary Analysis
    Florian Märkl
    Seminar “Reverse Code Engineering” Winter 2016/2017, Technische Universität München
    March 22, 2017, Munich, Germany

  122. Non-Semantics-Preserving Transformations for Higher-Coverage Test Generation Using Symbolic Execution
    Hayes Converse, Oswaldo Olivo, Sarfraz Khurshid
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2017)
    March 13-17, 2017, Tokyo, Japan

  123. Debugging Multithreaded Programs Using Symbolic Analysis
    Xiaodong Zhang
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2017)
    March 13-17, 2017, Tokyo, Japan

  124. Directed Automated Memory Performance Testing
    Sudipta Chattopadhyay
    International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2017)
    April 24-28, 2017, Uppsala, Sweden

  125. Bucketing Failing Tests via Symbolic Analysis
    Van-Thuan Pham, Sakaar Khurana, Subhajit Roy, Abhik Roychoudhury
    International Conference on Fundamental Approaches to Software Engineering (FASE 2017)
    April 26-28, 2017, Uppsala, Sweden

  126. Heuristically Matching Solution Spaces of Arithmetic Formulas to Efficiently Reuse Solutions
    Andrea Aquino, Giovanni Denaro, Mauro Pezzè
    ACM/IEEE International Conference on Software Engineering (ICSE 2017)
    May 20-28, 2017, Buenos Aires, Argentina

  127. An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption
    Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon, Mark Harman
    ACM/IEEE International Conference on Software Engineering (ICSE 2017)
    May 20-28, 2017, Buenos Aires, Argentina

  128. SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations
    Sze Yiu Chau, Omar Chowdhury, Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li
    IEEE Symposium on Security and Privacy (S&P 2017)
    May 22-24, 2017, San Jose, CA, USA

  129. Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs
    Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li
    IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017)
    June 26-29, 2017, Denver, CO, USA

  130. pbSE: Phase-Based Symbolic Execution
    Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao
    IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017)
    June 26-29, 2017, Denver, CO, USA

  131. StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution
    Fan Yao, Yongbo Li, Yurong Chen
    IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017)
    June 26-29, 2017, Denver, USA

  132. Accelerating Array Constraints in Symbolic Execution
    David M. Perry, Andrea Mattavelli, Xiangyu Zhang, Cristian Cadar
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2017)
    July 10-14, 2017, Santa Barbara, CA, USA
    KLEE-Array is available here.

  133. Automatic Detection and Validation of Race Conditions in Interrupt-Driven Embedded Software
    Yu Wang, Linzhang Wang, Tingting Yu, Jianhua Zhao, Xuandong Li
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2017)
    July 10-14, 2017, Santa Barbara, CA, USA

  134. A Formally Verified NAT
    Arseniy Zaostrovnykh, Solal Pirelli, Luis Pedrosa, Katerina Argyraki, George Candea
    Conference of the ACM Special Interest Group on Data Communication (SIGCOMM 2017)
    August 21-25, 2017, Los Angeles, USA
    VigNAT is available here.

  135. Effectiveness of Synthesis in Concolic Deobfuscation
    Fabrizio Biondi, Sébastien Josse, Axel Legay, Thomas Sirvent
    Computers & Security, Volume 70
    September 2017

  136. Failure-Directed Program Trimming
    Kostas Ferles, Valentin Wüstholz, Maria Christakis, Isil Dillig
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)
    September 6-8, 2017, Paderborn, Germany

  137. Symbolic Execution of Programmable Logic Controller Code
    Shengjian Guo, Meng Wu, Chao Wang
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)
    September 6-8, 2017, Paderborn, Germany

  138. Counterexample-Guided Approach to Finding Numerical Invariants
    ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)
    September 6-8, 2017, Paderborn, Germany

  139. Did we Learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries
    Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun Kanuparthi, Thomas Eisenbarth, Berk Sunar
    arXiv, September 5, 2017

  140. KLOVER: Automatic Test Generation for C and C++ Programs, Using Symbolic Execution
    Guodong Li, Takuki Kamiya, Indradeep Ghosh, Sreeranga Rajan, Susumu Tokumoto, Kazuki Munakata, Tadahiro Uehara
    IEEE Software, Volume 34, Issue 5
    September 22, 2017

  141. Quantifying the Information Leak in Cache Attacks via Symbolic Execution
    Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller
    ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE 2017)
    September 29 - October 2, 2017, Vienna, Austria

  142. Automatic Testing of Symbolic Execution Engines via Program Generation and Differential Testing
    Timotej Kapus, Cristian Cadar
    IEEE/ACM International conference on Automated Software Engineering (ASE 2017)
    October 30 - November 3, 2017, Urbana-Champaign, IL, USA

  143. Floating-Point Symbolic Execution: A Case Study in N-version Programming
    Daniel Liew, Daniel Schemmel, Cristian Cadar, Alastair Donaldson, Rafael Zähl, Klaus Wehrle
    IEEE/ACM International conference on Automated Software Engineering (ASE 2017)
    October 30 - November 3, 2017, Urbana-Champaign, IL, USA

  144. New Directions for Container Debloating
    Vaibhav Rastogi, Chaitra Niddodi, Sibin Mohan, Somesh Jha
    Workshop on Forming an Ecosystem Around Software Transformation (FEAST 2017)
    November 3, 2017, Dallas, USA

  145. Souper: A Synthesizing Superoptimizer
    Raimondas Sasnauskas, Yang Chen, Peter Collingbourne, Jeroen Ketema, Gratian Lup, Jubi Taneja, John Regehr
    arXiv, November 13, 2017
    Souper is available here.

  146. Resilience Evaluation via Symbolic Fault Injection on Intermediate Code
    Hoang M. Le, Vladimir Herdt, Daniel Große, Rolf Drechsler
    Design, Automation and Test in Europe (DATE 2018)
    March 19 - 23, 2018, Dresden, Germany

  147. Symbolic Assertion Mining for Security Validation
    Alessandro Danese, Valeria Bertacco, Graziano Pravadelli
    Design, Automation and Test in Europe (DATE 2018)
    March 19 - 23, 2018, Dresden, Germany

  148. Uncovering Bugs in P4 Programs with Assertion-based Verification
    Lucas Freire, Miguel Neves, Lucas Leal, Kirill Levchenko, Alberto Schaeffer-Filho, Marinho Barcellos
    Symposium on SDN Research (SOSR 2018)
    March 28-29, 2018, Los Angeles, USA

  149. CRETE: A Versatile Binary-Level Concolic Testing Framework
    Bo Chen, Christopher Havlicek, Zhenkun Yang, Kai Cong, Raghudeep Kannavara, Fei Xie
    International Conference on Fundamental Approaches to Software Engineering (FASE 2018)
    April 14-20, 2018, Thessaloniki, Greece
    CRETE is available here.

  150. Map2Check Using LLVM and KLEE
    Rafael Menezes, Herbert Rocha, Lucas Cordeiro, Raimundo Barreto
    International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2018)
    April 14-20, 2018, Thessaloniki, Greece
    Map2Check is available here.

  151. Evaluating Manual Intervention to Address the Challenges of Bug Finding with KLEE
    John Galea, Sean Heelan, Daniel Neville, Daniel Kroening
    arXiv, May 9, 2018

  152. Debugging Multithreaded Programs as if They Were Sequential
    Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Lechen Yu, Ting Liu
    IEEE Access, Volume 6
    May 11, 2018

  153. Chopped Symbolic Execution
    David Trabish, Andrea Mattavelli, Noam Rinetzky, Cristian Cadar
    ACM/IEEE International Conference on Software Engineering (ICSE 2018)
    May 27 - June 3, 2018, Gothenburg, Sweden
    Chopper is available here.

  154. Combining Symbolic Execution and Model Checking to VerifyMPI Programs
    Hengbiao Yu
    ACM/IEEE International Conference on Software Engineering (ICSE 2018 Companion)
    May 27 - June 3, 2018, Gothenburg, Sweden

  155. SAFL: Increasing and Accelerating Testing Coverage with Symbolic Execution and Guided Fuzzing
    Mingzhe Wang, Jie Liang, Yuanliang Chen, Yu Jiang, Xun Jiao, Han Liu, Xibin Zhao, Jiaguang Sun
    ACM/IEEE International Conference on Software Engineering (ICSE 2018 Companion)
    May 27 - June 3, 2018, Gothenburg, Sweden
    (Demo on Youtube)

  156. Semantic Program Repair Using a Reference Implementation
    Sergey Mechtaev, Manh-Dung Nguyen, Yannic Noller, Lars Grunske, Abhik Roychoudhury
    ACM/IEEE International Conference on Software Engineering (ICSE 2018)
    May 27 - June 3, 2018, Gothenburg, Sweden

  157. Indexing Operators to Extend the Reach of Symbolic Execution
    Earl T. Barr, David Clark, Mark Harman, Alexandru Marginean
    arXiv, June 26, 2018

  158. Symbolic Liveness Analysis for Real-World Software
    Daniel Schemmel, Julian Büning, Oscar Soria Dustmann, Thomas Noll, Klaus Wehrle
    International Conference on Computer Aided Verification (CAV 2018)
    July 14-17, 2018, Oxford, UK
    The implementation is available here.

  159. Learning to Accelerate Symbolic Execution via Code Transformation
    Junjie Chen, Wenxiang Hu, Lingming Zhang, Dan Hao, Sarfraz Khurshid, Lu Zhang
    European Conference on Object-Oriented Programming (ECOOP 2018)
    July 15-21, 2018, Amsterdam, Netherlands

  160. No Panic! Verification of Rust Programs by Symbolic Execution
    Marcus Lindner, Jorge Aparicius, Per Lindgren
    IEEE International Conference on Industrial Informatics (INDIN 2018)
    July 18-20, 2018, Porto, Protugal
    cargo-klee is available here.

  161. Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives
    Mathy Vanhoef, Frank Piessens
    USENIX Workshop on Offensive Technologies (WOOT 2018)
    August 13-14, 2018, Baltimore, USA

  162. Inception: System-Wide Security Testing of Real-World Embedded Systems Software
    Nassim Corteggiani, Giovanni Camurati, Aurélien Francillon
    USENIX Security Symposium (Security 2018)
    August 15-17, 2018, Baltimore, USA
    Inception is available here.

  163. A Formally Verified NAT Stack
    Solal Pirelli, Arseniy Zaostrovnykh, George Candea
    ACM SIGCOMM Afternoon Workshop on Kernel Bypassing Networks (KBNets 2018)
    August 20, 2018, Hungary, USA

  164. CPA-SymExec: Efficient Symbolic Execution in CPAchecker
    Dirk Beyer, Thomas Lemberger
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2018)
    September 3-7, 2018, Montpellier, France

  165. Loop Path Reduction by State Pruning
    Jianxiong Gao, Steven S. Lumetta
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2018)
    September 3-7, 2018, Montpellier, France

  166. PARTI: A Multi-interval Theory Solver for Symbolic Execution
    Oscar Soria Dustmann, Klaus Wehrle, Cristian Cadar
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2018)
    September 3-7, 2018, Montpellier, France

  167. BinRec: Attack Surface Reduction Through Dynamic Binary Recovery
    Taddeus Kroes, Anil Altinay, Joseph Nash, Yeoul Na, Stijn Volckaert, Herbert Bos, Michael Franz, Cristiano Giuffrida
    Workshop on Forming an Ecosystem Around Software Transformation (FEAST 2018)
    October 19, 2018, Toronto, Canada

  168. End-to-End Automated Exploit Generation for Validating the Security of Processor Designs
    Rui Zhang, Calvin Deutschbein, Peng Huang, Cynthia Sturton
    IEEE/ACM International Symposium on Microarchitecture (MICRO 2018)
    October 20-24, 2018, Fukuoka, Japan
    Coppelia is available here.

  169. Automata Learning for Symbolic Execution
    Bernhard K. Aichernig, Roderick Bloem, Masoud Ebrahimi, Martin Tappler, Johannes Winter
    Formal Methods in Computer Aided Design (FMCAD 2018)
    October 30 - November 2, 2018, Austin, USA

  170. Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
    Shengjian Guo, Meng Wu, Chao Wang
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018)
    November 4-9, 2018, Lake Buena Vista, USA

  171. Symbolic Execution with Existential Second-Order Constraints
    Sergey Mechtaev, Alberto Griggio, Alessandro Cimatti, Abhik Roychoudhury
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018)
    November 4-9, 2018, Lake Buena Vista, USA

  172. Detecting MPI Usage Anomalies via Partial Program Symbolic Execution
    Fangke Ye, Jisheng Zhao, Vivek Sarkar
    International Conference for High Performance Computing, Networking, Storage, and Analysis (SC 2018)
    November 11-16, 2018, Dallas, USA

  173. Symbolic Execution with Invariant Inlay: Evaluating the Potential
    Eman Alatawi, Tim Miller, Harald Sondergaard
    Australasian Software Engineering Conference (ASWEC 2018)
    November 26-30, 2018, Adelaide, Australia

  174. Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution
    Felix Rath, Daniel Schemmel, Klaus Wehrle
    Workshop on the Evolution, Performance, and Interoperability of QUIC (EPIQ 2018)
    December 4, 2018, Heraklion, Greece

  175. Boost Symbolic Execution Using Dynamic State Merging and Forking
    Chao Zhang Weiliang Yin Zhiqiang Lin
    International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2018)
    December 4, 2018, Nara, Japan

  176. Quantifying the Information Leakage in Cache Attacks via Symbolic Execution
    Moritz Beck, Ahmed Rezine, Andreas Zeller
    ACM Transactions on Embedded Computing Systems, Volume 18, Issue 1 (TECS)
    February, 2019

  177. Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification
    Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li
    Network and Distributed System Security Symposium (NDSS 2019)
    February 24-27, 2019, San Diego, USA

  178. Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints
    Shen Shiqi, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena
    Network and Distributed System Security Symposium (NDSS 2019)
    February 24-27, 2019, San Diego, USA

  179. Compositional Fuzzing Aided by Targeted Symbolic Execution
    Saahil Ognawala, Fabian Kilger, Alexander Pretschner
    arXiv, March 7, 2019

  180. Symbolic Execution based Verification of Compliance with the ISO 26262 Functional Safety Standard
    Mazen Ahmed, Mona Safar
    International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS 2019)
    April 16-18, 2019, Mykonos, Greece

  181. Mimicking User Behavior to Improve In-House Test Suites
    Qianqian Wang, Alessandro Orso
    IEEE/ACM International Conference on Software Engineering (ICSE 2019)
    May 25-31, 2019, Montreal, Canada

  182. Zero-Overhead Path Prediction with Progressive Symbolic Execution
    Richard Rutledge, Sunjae Park, Haider Khan, Alessandro Orso, Milos Prvulovic, Alenka Zajic
    IEEE/ACM International Conference on Software Engineering (ICSE 2019)
    May 25-31, 2019, Montreal, Canada
    pg-klee is available here.

  183. Early Concolic Testing of Embedded Binaries with Virtual Prototypes: A RISC-V Case Study
    Vladimir Herdt, Daniel Große, Hoang M. Le, Rolf Drechsler
    ACM/IEEE Design Automation Conference (DAC 2016)
    June 2-6, 2019, Las Vegas, USA

  184. ApproxSymate: Path Sensitive Program Approximation using Symbolic Execution
    Himeshi De Silva, Andrew E. Santosa, Nhut-Minh Ho, Weng-Fai Wong
    ACM International Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2019)
    June 23, 2019, Phoenix, USA
    ApproxSymate is available here.

  185. Computing Summaries of String Loops in C for Better Testing and Refactoring
    Timotej Kapus, Oren Ish-Shalom, Shachar Itzhaky, Noam Rinetzky, Cristian Cadar
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2019)
    June 24-26, 2019, Phoenix, USA

  186. Deferred Concretization in Symbolic Execution via Fuzzing
    Awanish Pandey, Phani Raj Goutham Kotcharlakota, Subhajit Roy
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2019)
    July 15-19, 2019, Beijing, China

  187. Verification of Safety Functions Implemented in Rust - a Symbolic Execution based approach
    Marcus Lindner, Nils Fitinghoff, Johan Eriksson, Per Lindgren
    IEEE International Conference on Industrial Informatics (INDIN 2019)
    July 22-25, Helsinki, Finland

  188. SCSE: Boosting Symbolic Execution via State Concretization
    Huibin Wang, Chunqiang Li, Jianyi Meng, Xiaoyan Xiang
    IEICE Transactions on Information and Systems, Issue 8
    August 2019

  189. A Segmented Memory Model for Symbolic Execution
    Timotej Kapus, Cristian Cadar
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2019)
    August 26-30, 2019, Tallin, Estonia
    The implementation is available here.

  190. Target-Driven Compositional Concolic Testing with Function Summary Refinement for Effective Bug Detection
    Yunho Kim, Shin Hong, Moonzoo Kim
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2019)
    August 26-30, 2019, Tallin, Estonia

  191. KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution
    Guanhua Wang, Sudipta Chattopadhyay, Arnab Kumar Biswas, Tulika Mitra, Abhik Roychoudhury
    arXiv, September 2, 2019
    KLEESpectre is available here.

  192. Constraints in Dynamic Symbolic Execution: Bitvectors or Integers?
    Timotej Kapus, Martin Nowack, Cristian Cadar
    International Conference on Tests and Proofs (TAP 2019)
    October 9-11, 2019, Porto, Portugal

  193. Memory Distance Measurement for Concurrent Programs
    Hao Li, Jialiang Chang, Zijiang Yang, Steve Carr
    Workshop on Languages and Compilers for Parallel Computing (LCPC 2019)
    October 22-24, Atlanta, USA

  194. KLUZZER: Whitebox Fuzzing on Top of LLVM
    Hoang M. Le
    International Symposium on Automated Technology for Verification and Analysis (ATVA 2019)
    October 27-31, 2019, Taipai, Taiwan

  195. Verifying Software Network Functions with no Verification Expertise
    Arseniy Zaostrovnykh, Solal Pirelli, Rishabh Iyer, Matteo Rizzo, Luis Pedrosa, Katerina Argyraki, George Candea
    ACM Symposium on Operating Systems Principles (SOSP 2019)
    October 27-30, 2019, Huntsville, Canada
    Vigor is available here.

  196. SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection
    Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo
    arXiv, November 4, 2019

  197. Fine-grain Memory Object Representation in Symbolic Execution
    Martin Nowack
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)
    November 10-15, 2019, San Diego, USA

  198. Reinforcement Learning Guided Symbolic Execution
    Jie Wu, Chengyu Zhang, Geguang Pu
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2020)
    February 18-21, 2020, London, Canada

  199. MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing
    Yaohui Chen, Mansour Ahmadi, Reza Mirzazade farkhani, Boyu Wang, Long Lu
    arXiv, February 20, 2020

  200. Is Register Transfer Level Locking Secure?
    Chandan Karfa, Ramanuj Chouksey, Christian Pilato, Siddharth Garg, Ramesh Karri
    Design, Automation & Test in Europe Conference & Exhibition (DATE 2020)
    March 9-13, 2020, Grenoble, France

  201. ConTesa: Directed Test Suite Augmentation for Concurrent Software
    Tingting Yu, Zunchen Huang, Chao Wang
    IEEE Transactions on Software Engineering, Volume 46, Issue 4 (TSE)
    April 16, 2020

  202. Specification-Driven Conformance Checking for Virtual/Silicon Devices using Mutation Testing
    Haifeng Gu, Jianning Zhang, Mingsong Chen, Tongquan Wei, Li Lei, Fei Xie
    IEEE Transactions on Computers
    April 21, 2020

  203. BinRec: Dynamic Binary Lifting and Recompilation
    Anil Altinay, Joseph Nash, Taddeus Kroes, Prabhu Rajasekaran, Dixin Zhou, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Cristiano Giuffrida, Herbert Bos, Michael Franz
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2020)
    April 27-30, 2020, Virtual Conference, Greece

  204. Mousse: A System for Selective Symbolic Execution of Programs with Untamed Environments
    Yingtong Liu, Hsin-Wei Hung, Ardalan Amiri Sani
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2020)
    April 27-30, 2020, Virtual Conference, Greece
    Mousse is available here.

  205. SAVIOR: Towards Bug-Driven Hybrid Testing
    Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Taowei, Long Lu
    IEEE Symposium on Security and Privacy (S&P 2020)
    May 18-20, 2020, Virtual Conference, USA
    SAVIOR is available here.

  206. PG-KLEE: Trading Soundness for Coverage
    Richard Rutledge, Alessandro Orso
    ACM/IEEE International Conference on Software Engineering (ICSE 2020 Companion)
    May 23-29, 2020, Seoul, Republic of Korea

  207. Symbolic Verification of Message Passing Interface Programs
    Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, Wei Dong
    ACM/IEEE International Conference on Software Engineering (ICSE 2020)
    May 23-29, 2020, Seoul, Republic of Korea

  208. KLEE Symbolic Execution Engine in 2019
    Cristian Cadar, Martin Nowack
    International Journal on Software Tools for Technology Transfer (2020)
    June 2, 2020

  209. Modified Condition/Decision Coverage (MC/DC) Oriented Compiler Optimization for Symbolic Execution
    Wei-jiang Hong, Yi-jun Liu, Zhen-bang Chen, Wei Dong, Ji Wang
    Frontiers of Information Technology & Electronic Engineering, Issue 21
    June 26, 2020

  210. Relocatable Addressing Model for Symbolic Execution
    David Trabish, Noam Rinetzky
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020)
    July 18–22, 2020, Virtual Event, USA
    klee-ram is available here.

  211. Running Symbolic Execution Forever
    Frank Busse, Martin Nowack, Cristian Cadar
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020)
    July 18–22, 2020, Virtual Event, USA
    MoKlee is available here.

  212. Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
    Daniel Schemmel, Julian Büning, César Rodríguez, David Laprell, Klaus Wehrle
    International Conference on Computer Aided Verification (CAV 2020)
    July 19-24, 2020, Virtual Event, USA

  213. Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling
    Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Ting Liu
    IEEE Transactions on Software Engineering, Volume 46, Issue 9 (TSE)
    September 1, 2020

  214. Countermeasures Optimization in Multiple Fault-Injection Context
    Etienne Boespflug, Cristian Ene, Laurent Mounier, Marie-Laure Potet
    Workshop on Fault Detection and Tolerance in Cryptography (FDTC 2020)
    September 13, 2020, Virtual Event

  215. Analyzing System Software Components Using API Model Guided Symbolic Execution
    Tuba Yavuz, Ken (Yihang) Bai
    Automated Software Engineering (AUSE)
    September 19, 2020
    PROMPT is available here.

  216. Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once
    Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Tianqi Zhang, Kenli Li, Ji Wang
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2020)
    September 21-25, 2020, Virtual Event, AU

  217. Pending Constraints in Symbolic Execution for Better Exploration and Seeding
    Timotej Kapus, Frank Busse, Cristian Cadar
    IEEE/ACM International Conference on Automated Software Engineering (ASE 2020)
    September 21-25, 2020, Virtual Event, AU
    The artefact is available here.

  218. Reproducible Execution of POSIX Programs with DiOS
    Petr Ročkai, Zuzana Baranová, Jan Mrázek, Katarína Kejstová, Jiříí Barnat
    Software and Systems Modeling, Volume 20 (SoSyM)
    October 23, 2020
    DiVine/DiOS are available here.

  219. AGAMOTTO: How Persistent is your Persistent Memory Application?
    Ian Neal, Ben Reeves, Ben Stoler, Andrew Quinn, Youngjin Kwon, Simon Peter, Baris Kasikci
    14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2020)
    November 4-6, 2020, Virtual Event, USA
    AGAMOTTO is available here.

  220. Exposing Cache Timing Side-Channel Leaks Through Out-of-Order Symbolic Execution
    Shengjian Guo, Yueqi Chen, Jiyong Yu, Meng Wu, Zhiqiang Zuo, Peng Li, Yueqiang Cheng, Huibo Wang
    ACM SIGPLAN Conference on Systems, Programming, Languages, and Applications: Software for Humanity (SPLASH 2020)
    November 15-21, 2020, Virtual Event

  221. Making Symbolic Execution Promising by Learning Aggressive State-Pruning Strategy
    Sooyoung Cha, Hakjoo Oh
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020)
    November 8-13, 2020, Virtual Event, USA
    HOMI is available here (artefact).

  222. Past-Sensitive Pointer Analysis for Symbolic Execution
    David Trabish, Timotej Kapus, Noam Rinetzky, Cristian Cadar
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020)
    November 8-13, 2020, Virtual Event, USA
    PSPA is available here.

  223. UBITect: A Precise and Scalable Method to Detect Use-before-Initialization Bugs in Linux Kernel
    Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul Yu ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020)
    November 8-13, 2020, Virtual Event, USA
    The artefact is available here.

  224. Type Checking beyond Type Checkers, via Slice & Run
    Justus Adam, Stephen Kell
    Workshop on Tools for Automatic Program Analysis (TAPAS 2020)
    November 19, 2020, Virtual Event, USA

  225. Automatic Buffer Overflow Warning Validation
    Feng-Juan Gao, Yu Wang, Lin-Zhang Wang, Zijiang Yang, Xuan-Dong Li
    Automatic Buffer Overflow Warning Validation. Journal of Computer Science and Technology, Volume 35 (JCST 2020)
    November 20, 2020

  226. TracerX: Dynamic Symbolic Execution with Interpolation
    Joxan Jaffar, Rasool Maghareh, Sangharatna Godboley, Xuan-Linh Ha
    arXiv, December 1, 2020

  227. On Symbolic Execution of Decompiled Programs
    Lukáš Korenčik, Petr Ročkai
    IEEE International Conference on Software Quality, Reliability and Security (QRS 2020)
    Dezember 11-14, 2020, Macau, China

  228. Automated Patch Transplantation
    Ridwan Shariffdeen, Shin Hwei Tan, Mingyuan Gao, Abhik Roychoudhury
    ACM Transactions on Software Engineering and Methodology, Volume 30, Issue 1 (TOSEM)
    January 2021
    PatchWeave is available here.

  229. Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction
    Xiang Gao, Bo Wang, Gregory J. Duck, Ruyi Ji, Yingfei Xiong, Abhik Roychoudhury
    ACM Transactions on Software Engineering and Methodology, Volume 30, Issue 2 (TOSEM)
    March 2021
    ExtractFix is available here.

  230. Killing Stubborn Mutants with Symbolic Execution
    Thierry Titcheu Chekam, Mike Papadakis, Maxime Cordy, Yves Le Traon
    ACM Transactions on Software Engineering and Methodology, Volume 30, Issue 2 (TOSEM)
    March 2021
    SEMu is available here.

  231. Parallel Chopped Symbolic Execution
    Shikhar Singh, Sarfraz Khurshid
    International Conference on Formal Engineering Methods (ICFEM 2020)
    March 1-3, 2021, Singapore

  232. Dynamic Property Enforcement in Programmable Data Planes
    Miguel Neves, Bradley Huffaker, Kirill Levchenko, Marinho Barcellos
    IEEE/ACM Transactions on Networking (TON)
    April 1, 2021

  233. Address-Aware Query Caching for Symbolic Execution
    David Trabish, Shachar Itzhaky, Noam Rinetzky
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2021)
    April 12-16, 2021, Virtual Event, Brazil
    The implementation is available here.

  234. Metrinome: Path Complexity Predicts Symbolic Execution Path Explosion
    Gabriel Bessler, Josh Cordova, Shaheen Cullen-Baratloo, Sofiane Dissem, Emily Lu, Sofia Devin, Ibrahim Abughararh, Lucas Bang
    ACM/IEEE International Conference on Software Engineering (ICSE 2021 Companion)
    May 25-28, 2021, Virtual Event
    Metrinome is available here.

  235. SIT-SE: A Specification-Based Incremental Testing Method With Symbolic Execution
    Rong Wang, Shaoying Liu, Yuji Sato
    IEEE Transactions on Reliability, Volume 70, Issue 3
    May 26, 2021

  236. Concolic Program Repair
    Ridwan Salihin Shariffdeen, Yannic Noller, Lars Grunske, Abhik Roychoudhury
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2021)
    June 20-26, 2021, Virtual Event
    The artefact is available here.

  237. Execution Reconstruction: Harnessing Failure Reoccurrences for Failure Reproduction
    Gefei Zuo, Jiacheng Ma, Andrew Quinn, Pramod Bhatotia, Pedro Fonseca, Baris Kasikci
    ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2021)
    June 20-26, 2021, Virtual Event
    The artefact is available here.

  238. FCEP: A Fast Concolic Execution for Reaching Software Patches
    Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng
    International Conference on Software Engineering & Knowledge Engineering (SEKE 2021)
    July 1-10, 2021, Virtual Event

  239. Enhancing Dynamic Symbolic Execution by Automatically Learning Search Heuristics
    Sooyoung Cha, Seongjoon Hong, Jiseong Bak, Jingyoung Kim, Junhee Lee, Hakjoo Oh
    IEEE Transactions on Software Engineering (TSE)
    August 4, 2021
    ParaDySE is available here.

  240. Automatic Firmware Emulation through Invalidity-guided Knowledge Inference
    Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang
    USENIX Security Symposium (Security 2021)
    August 11-13, 2021, Virtual Event

  241. MAZE: Towards Automated Heap Feng Shui
    Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou
    USENIX Security Symposium (Security 2021)
    August 11-13, 2021, Virtual Event

  242. Boosting Symbolic Execution via Constraint Solving Time Prediction
    Sicheng Luo, Hui Xu, Yanxiang Bi, Xin Wang, Yangfan Zhou
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021)
    August 14-16, 2021, Virtual Event
    The artefact is available here.

  243. Synthesize Solving Strategy for Symbolic Execution
    Zhenbang Chen, Zehua Chen, Ziqi Shuai, Guofeng Zhang, Weiyu Pan, Yufeng Zhang, Ji Wang
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021)
    August 14-16, 2021, Virtual Event

  244. Toward Optimal MC/DC Test Case Generation
    Sangharatna Godboley, Joxan Jaffar, Rasool Maghareh, Arpita Dutta
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021)
    August 14-16, 2021, Virtual Event
    The artefact is available here.

  245. Type and Interval Aware Array Constraint Solving for Symbolic Execution
    Ziqi Shuai, Zhenbang Chen, Yufeng Zhang, Jun Sun, Ji Wang
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021)
    August 14-16, 2021, Virtual Event
    The artefact is available here.

  246. Validating Static Warnings via Testing Code Fragments
    Ashwin Kallingal Joshy, Xueyuan Chen, Benjamin Steenhoek, Wei Le
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021)
    August 14-16, 2021, Virtual Event
    Helium is available here.

  247. A Bounded Symbolic-Size Model for Symbolic Execution
    David Trabish, Shachar Itzhaky, Noam Rinetzky
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2021)
    August 23-28, 2021, Athens, Greece
    The implementation is available here.

  248. Security-Hardening Software Libraries with Ada and SPARK
    Kyriakos Georgiou, Guillaume Cluzel, Paul Butcher, Yannick Moy
    arXiv, September 2, 2021

  249. Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to Detect Fault Injection Vulnerabilities
    Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet
    International Workshop on Security Proofs for Embedded Systems (PROOFS 2021)
    September 17, 2021, Virtual Event

  250. Layered Formal Verification of a TCP Stack
    Guillaume Cluzel, Kyriakos Georgiou, Yannick Moy, Clément Zeller
    IEEE Secure Development Conference (SecDev 2021)
    October 18-20, 2021, Virtual Event
    The implementation is available here.

  251. Trident: Controlling Side Effects in Automated Program Repair
    Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev
    IEEE Transactions on Software Engineering (TSE 2022)
    November 13, 2021

  252. Learning to Explore Paths for Symbolic Execution
    Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin Vechev
    ACM Conference on Computer and Communications Security (CCS 2021)
    November 15-19, 2021, Virtual Event

  253. Function Exclusion in Automated Security Patch Testing Using Chopped Symbolic Execution
    Phan Ninh Thai, Hung Nguyen Viet, Nathan Shone, Mikhail Babenko
    NAFOSTED Conference on Information and Computer Science (NICS 2021)
    December 21-22, 2021, Hanoi City, Vietnam

  254. EXGEN: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities
    Ling Jin, Yinzhi Cao, Yan Chen, Di Zhang, Simone Campanoni
    IEEE Transactions on Dependable and Secure Computing (TDSC)
    January 7, 2022

  255. FIRVER: Concolic Testing for Systematic Validation of Firmware Binaries
    Tashfia Alam, Zhenkun Yang, Bo Chen, Nicholas Armour, Sandip Ray
    Asia and South Pacific Design Automation Conference (ASP-DAC 2022)
    January 17-20, 2022, Virtual Event

  256. Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel
    Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul Yu
    Network and Distributed System Security Symposium (NDSS 2022)
    February 27 - March 3, 2022, San Diego, USA
    The artefact is available here.

  257. The Taming of the Stack: Isolating Stack Data from Memory Errors
    Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger
    Network and Distributed System Security Symposium (NDSS 2022)
    February 27 - March 3, 2022, San Diego, USA

  258. Characterizing and Improving Bug-Finders with Synthetic Bugs
    Yu Hu, Zekun Shen, Brendan Dolan-Gavitt
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2020)
    March 15-18, 2022, Virtual Event

  259. SymEx-VP: An Open Source Virtual Prototype for OS-agnostic Concolic Testing of IoT Firmware
    Sören Tempel, Vladimir Herdt, Rolf Drechsler
    Journal of Systems Architecture (JSA)
    16 March, 2022

  260. Efficient Protocol Testing Under Temporal Uncertain Event Using Discrete-event Network Simulations
    Minh Vu, Lisong Xu, Sebastian Elbaum, Wei Sun, Kevin Qiao
    ACM Transactions on Modeling and Computer Simulation, Volume 32, Issue 2 (TOMACS)
    April, 2022

  261. DivSIM, an Interactive Simulator for LLVM Bitcode
    Petr Ročkai, Jiří Barnat
    International Journal on Software Tools for Technology Transfer (2022)
    April 1, 2022
    DivSim is part of DIVINE 4.

  262. SIFT: A Tool for Property Directed Symbolic Execution of Multithreaded Software
    Tuba Yavuz
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2022)
    April 4-8, 2022, Virtual Event

  263. Applying Symbolic Execution to Test Implementations of a Network Protocol Against its Specification
    Hooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson, and Konstantinos Sagonas
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2022)
    April 4-13, 2022, Virtual Event
    The artefact is available here.

  264. Automating Differential Testing with Overapproximate Symbolic Execution
    Richard Rutledge, Alessandro Orso
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2022)
    April 4-13, 2022, Virtual Event

  265. DEEQ: Data-driven End-to-End EQuivalence Checking of High-level Synthesis
    Mohammed Abderehman, Theegala Rakesh Reddy, Chandan Karfa
    International Symposium on Quality Electronic Design (ISQED 2022)
    April 6-7, 2022, Santa Clara, USA

  266. Argon: A Toolbase for Evaluating Software Protection Techniques Against Symbolic Execution Attacks
    Deepak Adhikari, J. Todd McDonald, Todd R. Andel, Joseph D. Richardson
    IEEE SoutheastCon 2022
    April 13-16, 2022, Orlando, USA
    Argon is available here.

  267. Symbolic Identification of Shared Memory Based Bank Conflicts for GPUs
    Adrian Horga, Ahmed Rezine, Sudipta Chattopadhyay, Petru Eles, Zebo Peng
    Journal of Systems Architecture (JSA)
    April 20, 2022

  268. SymTuner: Maximizing the Power of Symbolic Execution by Adaptively Tuning External Parameters
    Sooyoung Cha, Myungho Lee, Seokhyun Lee, Hakjoo Oh
    ACM/IEEE International Conference on Software Engineering (ICSE 2022)
    May 8-10, 2022, Virtual Event; May 22-27, 2022, Pittsburgh, USA

  269. A Deterministic Memory Allocator for Dynamic Symbolic Execution
    Daniel Schemmel, Julian Büning, Frank Busse, Martin Nowack, Cristian Cadar
    European Conference on Object-Oriented Programming (ECOOP 2022)
    June 8-10, 2022, Berlin, Germany

  270. Verifying SystemC TLM Peripherals using Modern C++ Symbolic Execution Tools
    Pascal Pieper, Vladimir Herdt, Daniel Große, Rolf Drechsler
    Design Automation Conference (DAC 2022)
    July 10-14, 2022, San Francisco, USA

  271. Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper)
    Frank Busse, Pritam Gharat, Cristian Cadar, Alastair Donaldson
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022)
    July 18-22, 2022, Virtual Event
    The artefact is available here.

  272. Semantic-Aware Vulnerability Detection
    Zhen Huang, Marc White
    IEEE International Conference on Cyber Security and Resilience (CSR 2022)
    July 27-29, 2022, Virtual Event

  273. LinKRID: Vetting Imbalance Reference Counting in Linux Kernel with Symbolic Execution
    Jian Liu, Lin Yi, Weiting Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    USENIX Security Symposium (Security 2022)
    August, 10-12, 2022, Boston, USA

  274. SKLEE: A Dynamic Symbolic Analysis Tool for Ethereum Smart Contracts (Tool Paper)
    Namrata Jain, Kosuke Kaneko, Subodh Sharma
    International Conference on Software Engineering and Formal Methods (SEFM 2022)
    September, 26-30, 2022, Berlin, Germany

  275. Symbolic Execution for Randomized Programs
    Zachary Susag, Sumit Lahiri, Justin Hsu, Subhajit Roy
    Proceedings of the ACM on Programming Languages, Volume 6, Issue OOPSLA2
    October 31, 2022
    The artefact is available here.

  276. Feedback-Driven Incremental Symbolic Execution
    Qiuping Yi, Guowei Yang
    IEEE International Symposium on Software Reliability Engineering (ISSRE 2022)
    October 31 - November 3, 2022, Charlotte, USA

  277. FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers
    Haoxin Tu, Lingxiao Jiang, Xuhua Ding, He Jiang
    ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2022 Demo)
    November, 14-16, 2022, Singapore
    FastKLEE is available here.

  278. Solder: Retrofitting Legacy Code with Cross-Language Patches
    R. Williams, A. Gavazzi, E. Kirda
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2023)
    March, 21-24, 2023, Macao, China

  279. An Efficient Black-Box Support of Advanced Coverage Criteria for Klee
    Nicolas Berthier, Steven De Oliveira, Nikolai Kosmatov, Delphine Longuet, Romain Soulat
    ACM/SIGAPP Symposium On Applied Computing (SAC 2023)
    March, 27-31, 2023, Tallin, Estonia

  280. An Automated Verification Framework for HalideIR-Based Compiler Transformations
    Yanzhao Wang, Fei Xie, Zhenkun Yang, Jeremy Casas, Pasquale Cocchini, Jin Yang
    Design, Automation and Test in Europe Conference (DATE 2023)
    April, 17-19, 2023, Antwerp, Belgium

  281. Processor Verification using Symbolic Execution: A RISC-V Case-Study
    Niklas Bruns, Vladimir Herdt, Rolf Drechsler
    Design, Automation and Test in Europe Conference (DATE 2023)
    April, 17-19, 2023, Antwerp, Belgium

  282. Automatically Generating Test Cases for Safety-critical Software via Symbolic Execution
    Elson Kurian, Daniela Briola, Pietro Braione, Giovanni Denaro
    Journal of Systems and Software, Volume 199
    May, 2023