Skip to main content

Showing 1–2 of 2 results for author: Psallida, E

.
  1. arXiv:1803.04881  [pdf, ps, other

    cs.SE

    Reviewing KLEE's Sonar-Search Strategy in Context of Greybox Fuzzing

    Authors: Saahil Ognawala, Alexander Pretschner, Thomas Hutzelmann, Eirini Psallida, Ricardo Nales Amato

    Abstract: Automatic test-case generation techniques of symbolic execution and fuzzing are the most widely used methods to discover vulnerabilities in, both, academia and industry. However, both these methods suffer from fundamental drawbacks that stop them from achieving high path coverage that may, consequently, lead to discovering vulnerabilities at the numerical scale of static analysis. In this presenta… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: To be presented at KLEE Workshop 2018, London

  2. Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach

    Authors: Saahil Ognawala, Thomas Hutzelmann, Eirini Psallida, Alexander Pretschner

    Abstract: Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all paths in the program. Due to the path-explosion problem and dependence on SMT solvers, symbolic execution may also not achieve high path coverage. A… ▽ More

    Submitted 12 December, 2017; v1 submitted 26 November, 2017; originally announced November 2017.

    Comments: To appear at 33rd ACM/SIGAPP Symposium On Applied Computing (SAC). To be held from 9th to 13th April, 2018