Goal-oriented dynamic test generation
Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security errors are important tasks of software testing for improving the quality and reliability of software in practice. This paper presents a goal-orie...
Uloženo v:
| Vydáno v: | Information and software technology Ročník 66; s. 40 - 57 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Amsterdam
Elsevier B.V
01.10.2015
Elsevier Science Ltd |
| Témata: | |
| ISSN: | 0950-5849, 1873-6025 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security errors are important tasks of software testing for improving the quality and reliability of software in practice.
This paper presents a goal-oriented testing approach for effectively and efficiently exploring security vulnerability errors. A goal is a potential safety violation and the testing approach is to automatically generate test inputs to uncover the violation.
We use type inference analysis to diagnose potential safety violations and dynamic symbolic execution to perform test input generation. A major challenge facing dynamic symbolic execution in such application is the combinatorial explosion of the path space. To address this fundamental scalability issue, we employ data dependence analysis to identify a root cause leading to the execution of the goal and propose a path exploration algorithm to guide dynamic symbolic execution for effectively discovering the goal.
To evaluate the effectiveness of our proposed approach, we conducted experiments against 23 buffer overflow vulnerabilities. We observed a significant improvement of our proposed algorithm over two widely adopted search algorithms. Specifically, our algorithm discovered security vulnerability errors within a matter of a few seconds, whereas the two baseline algorithms failed even after 30min of testing on a number of test subjects.
The experimental results highlight the potential of utilizing data dependence analysis to address the combinatorial path space explosion issue faced by dynamic symbolic execution for effective security testing. |
|---|---|
| AbstractList | Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security errors are important tasks of software testing for improving the quality and reliability of software in practice. This paper presents a goal-oriented testing approach for effectively and efficiently exploring security vulnerability errors. A goal is a potential safety violation and the testing approach is to automatically generate test inputs to uncover the violation. The authors use type inference analysis to diagnose potential safety violations and dynamic symbolic execution to perform test input generation. A major challenge facing dynamic symbolic execution in such application is the combinatorial explosion of the path space. To address this fundamental scalability issue, the authors employ data dependence analysis to identify a root cause leading to the execution of the goal and propose a path exploration algorithm to guide dynamic symbolic execution for effectively discovering the goal. To evaluate the effectiveness of the proposed approach, the authors conducted experiments against 23 buffer overflow vulnerabilities. They observed a significant improvement of the proposed algorithm over two widely adopted search algorithms. Specifically, the algorithm discovered security vulnerability errors within a matter of a few seconds, whereas the two baseline algorithms failed even after 30 min of testing on a number of test subjects. The experimental results highlight the potential of utilizing data dependence analysis to address the combinatorial path space explosion issue faced by dynamic symbolic execution for effective security testing. Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security errors are important tasks of software testing for improving the quality and reliability of software in practice. This paper presents a goal-oriented testing approach for effectively and efficiently exploring security vulnerability errors. A goal is a potential safety violation and the testing approach is to automatically generate test inputs to uncover the violation. We use type inference analysis to diagnose potential safety violations and dynamic symbolic execution to perform test input generation. A major challenge facing dynamic symbolic execution in such application is the combinatorial explosion of the path space. To address this fundamental scalability issue, we employ data dependence analysis to identify a root cause leading to the execution of the goal and propose a path exploration algorithm to guide dynamic symbolic execution for effectively discovering the goal. To evaluate the effectiveness of our proposed approach, we conducted experiments against 23 buffer overflow vulnerabilities. We observed a significant improvement of our proposed algorithm over two widely adopted search algorithms. Specifically, our algorithm discovered security vulnerability errors within a matter of a few seconds, whereas the two baseline algorithms failed even after 30min of testing on a number of test subjects. The experimental results highlight the potential of utilizing data dependence analysis to address the combinatorial path space explosion issue faced by dynamic symbolic execution for effective security testing. |
| Author | Khoo, Siau-Cheng Do, TheAnh Quan, Tho Thanh Pears, Russel Fong, Alvis Cheuk Ming |
| Author_xml | – sequence: 1 givenname: TheAnh surname: Do fullname: Do, TheAnh organization: Auckland University of Technology, 2-14 Wakefield St, Auckland 1010, New Zealand – sequence: 2 givenname: Siau-Cheng surname: Khoo fullname: Khoo, Siau-Cheng organization: National University of Singapore, COM1, 13 Computing Drive, Singapore 117417, Singapore – sequence: 3 givenname: Alvis Cheuk Ming surname: Fong fullname: Fong, Alvis Cheuk Ming organization: Auckland University of Technology, 2-14 Wakefield St, Auckland 1010, New Zealand – sequence: 4 givenname: Russel surname: Pears fullname: Pears, Russel email: russel.pears@aut.ac.nz organization: Auckland University of Technology, 2-14 Wakefield St, Auckland 1010, New Zealand – sequence: 5 givenname: Tho Thanh surname: Quan fullname: Quan, Tho Thanh organization: Ho Chi Minh City University of Technology, 268 Ly Thuong Kiet St, Ho Chi Minh City, Viet Nam |
| BookMark | eNqFUE1LAzEUDFLBtvoPPBTE464vm81-eBCkaBUKXvQcstkXydImNUmF_ntT15MHhYF3eDPz5s2MTKyzSMglhZwCrW6G3FgdnM4LoDyHBKhPyJQ2NcsqKPiETKHlkPGmbM_ILIQBgNbAYEquV05uMucN2oj9oj9YuTVqETHExTta9DIaZ8_JqZabgBc_c07eHh9el0_Z-mX1vLxfZ4qxMmaoakDeQ8tYxajuVEkb2ldcF5p3VGFbNchbXSBrWN1QXtC-lUwXqku7rpFsTq5G3513H_uUQQxu7206KWjVsgIq2vLEuh1ZyrsQPGqhTPzOGb00G0FBHGsRgxhrEcdaBCRAncTlL_HOm630h_9kd6MM0_ufBr0IKnWmsDceVRS9M38bfAGv_3-I |
| CitedBy_id | crossref_primary_10_1016_j_infsof_2018_11_006 crossref_primary_10_3390_electronics11050727 crossref_primary_10_1016_j_csi_2020_103444 |
| Cites_doi | 10.1109/ASE.2008.69 10.1145/2379776.2379787 10.1007/978-3-642-16573-3_11 10.1109/DSN.2009.5270315 10.1145/1065010.1065036 10.1109/TSE.1976.233817 10.1016/j.cor.2007.01.013 10.1145/1081706.1081750 10.1145/2025113.2025152 10.1145/1831708.1831732 10.1145/360248.360252 10.1109/ISSRE.2012.25 10.1007/978-3-540-71316-6_35 10.1145/1190216.1190226 10.1145/1450058.1450087 10.1145/226155.226158 10.1145/2254064.2254088 10.1109/DISCEX.2000.821514 10.1145/2408776.2408795 10.1007/11691617_10 10.1007/978-3-642-02652-2_16 10.1145/2093548.2093564 10.1145/2483760.2483777 10.1007/978-3-540-79124-9_10 10.1145/1831708.1831733 10.1109/FOSE.2007.29 10.1109/ICSE.2013.6606558 10.1145/1985793.1985995 10.1162/evco.2006.14.1.41 10.1007/s10009-009-0118-1 10.1016/j.infsof.2012.03.009 10.1007/978-3-642-23702-7_11 10.1145/1993498.1993558 10.1109/CGO.2004.1281665 10.1145/1273463.1273489 10.1145/2048066.2048083 10.1145/2393596.2393666 10.1145/1321631.1321691 10.1007/s11219-011-9150-y 10.1049/ip-sen:20030559 |
| ContentType | Journal Article |
| Copyright | 2015 Copyright Elsevier Science Ltd. Oct 2015 |
| Copyright_xml | – notice: 2015 – notice: Copyright Elsevier Science Ltd. Oct 2015 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.infsof.2015.05.007 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Business |
| EISSN | 1873-6025 |
| EndPage | 57 |
| ExternalDocumentID | 3733402091 10_1016_j_infsof_2015_05_007 S0950584915001044 |
| Genre | Feature |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 77K 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN AAYOK ABBOA ABFNM ABFRF ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFO ACGFS ACGOD ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TWZ UHS UNMZH WH7 WUQ XFK ZY4 ~G- 77I 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c334t-ec70e5d0933631fbc4181d65f2f5b1ce968e59f2e383781521d9a3f2cbce9b8a3 |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000358699900004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0950-5849 |
| IngestDate | Sun Nov 09 06:00:28 EST 2025 Tue Nov 18 22:36:06 EST 2025 Sat Nov 29 07:49:45 EST 2025 Fri Feb 23 02:23:56 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Buffer overflow vulnerabilities Type inference analysis Dynamic symbolic execution Data and control dependence analysis |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c334t-ec70e5d0933631fbc4181d65f2f5b1ce968e59f2e383781521d9a3f2cbce9b8a3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
| PQID | 1693206195 |
| PQPubID | 41979 |
| PageCount | 18 |
| ParticipantIDs | proquest_journals_1693206195 crossref_citationtrail_10_1016_j_infsof_2015_05_007 crossref_primary_10_1016_j_infsof_2015_05_007 elsevier_sciencedirect_doi_10_1016_j_infsof_2015_05_007 |
| PublicationCentury | 2000 |
| PublicationDate | October 2015 2015-10-00 20151001 |
| PublicationDateYYYYMMDD | 2015-10-01 |
| PublicationDate_xml | – month: 10 year: 2015 text: October 2015 |
| PublicationDecade | 2010 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Information and software technology |
| PublicationYear | 2015 |
| Publisher | Elsevier B.V Elsevier Science Ltd |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier Science Ltd |
| References | J. Burnim, K. Sen, Heuristics for scalable dynamic test generation, in: Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, 2008, pp. 443–446. K. Sen, D. Marinov, G. Agha, CUTE: a concolic unit testing engine for C, in: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, pp. 263–272. D. Qi, H.D.T. Nguyen, A. Roychoudhury, Path exploration based on symbolic output, in: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, 2011, pp. 278–288. N. Rungta, E.G. Mercer, W. Visser, Efficient testing of concurrent programs with abstraction-guided symbolic execution, in: Proceedings of the 16th International SPIN Workshop on Model Checking Software, 2009, pp. 174–191. Godefroid, Levin, Molnar (b0130) 2012; 55 Harman, Mansouri, Zhang (b0140) 2012; 45 O. Ruwase, M.S. Lam, A practical dynamic buffer overflow detector, in: Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004. Clarke, Dolado, Harman, Hierons, Jones, Lumkin, Mitchell, Mancoridis, Rees, Roper, Shepperd (b0050) 2003; 150 S. Person, G. Yang, N. Rungta, S. Khurshid, Directed incremental symbolic execution, in: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011, pp. 504–515. Common Weakness Enumeration, The 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Baluda, Braione, Denaro, Pezzè (b0020) Dec. 2011; 19 T. Xie, N. Tillmann, J. de Halleux, W. Schulte, Fitness–guided path exploration in dynamic symbolic execution, in: Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2009, pp. 359–368. K. Lakhotia, N. Tillmann, M. Harman, J. de Halleux, FloPSy: search-based floating point constraint solving for symbolic execution, in: Proceedings of the 22nd IFIP WG 6.1 International Conference on Testing Software and Systems, 2010, pp. 142–157. P. Godefroid, M.Y. Levin, D.A. Molnar, Active property checking, in: Proceedings of the 8th ACM International Conference on Embedded Software, 2008, pp. 207–216. S. Anand, C.S. Păsăreanu, W. Visser, Symbolic execution with abstract subsumption checking, in: Proceedings of the 13th International SPIN Workshop on Model Checking Software, 2006, pp. 163–181. J. Condit, M. Harren, Z.R. Anderson, D. Gay, G.C. Necula, Dependent types for low-level programming, in: Proceedings of the 16th European Conference on Programming, 2007, pp. 520–535. King (b0150) 1976; 19 Do, Fong, Pears (b0095) 2013; vol. 410 C. Lattner, V.S. Adve, LLVM: a compilation framework for lifelong program analysis and transformation, in: Proceedings of the International Symposium on Code Generation and Optimization: Feedback-Directed and Runtime Optimization, 2004, pp. 75–88. . Binkley, Harman, Lakhotia (b0030) 2011; 20 J.E. Forrester, B.P. Miller, An empirical study of the robustness of Windows NT applications using random testing, in: Proceedings of the 4th Conference on USENIX Windows Systems Symposium, 2000, pp. 6–6. B. Xin, X. Zhang, Efficient online detection of dynamic control dependence, in: Proceedings of the 2007 International Symposium on Software Testing and Analysis, 2007, pp. 185–195. S. Arlt, A. Podelski, C. Bertolini, M. Schaf, I. Banerjee, A.M. Memon, Lightweight static analysis for GUI testing, in: Proceedings of the IEEE 23rd International Symposium on Software Reliability Engineering, 2012, pp. 301–310. C.S. Jensen, M.R. Prasad, A. Møller, Automated testing with targeted event sequence generation, in: Proceedings of the 2013 International Symposium on Software Testing and Analysis, 2013, pp. 67–77. Ferguson, Korel (b0100) 1996; 5 P. Godefroid, M.Y. Levin, D.A. Molnar, Automated whitebox fuzz testing, in: Proceedings of Network and Distributed Systems Security, 2008. S. Anand, M. Naik, M.J. Harrold, H. Yang, Automated concolic testing of smartphone apps, in: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, 2012. Del Grosso, Antoniol, Merlo, Galinier (b0090) 2008; 35 Cadar, Ganesh, Pawlowski, Dill, Engler (b0060) Dec. 2008; 12 M. Weiser, Program slicing, in: Proceedings of the 5th International Conference on Software Engineering, 1981, pp. 439–449. K.K. Ma, Y.P. Khoo, J.S. Foster, M. Hicks, Directed symbolic execution, in: Proceedings of the 18th International Conference on Static Analysis, 2011, pp. 95–111. D.A. Molnar, Dynamic Test Generation for Large Binary Programs, Ph.D. Dissertation, University of California, Berkeley, 2009. M. Staats, C.S. Păsăreanu, Parallel symbolic execution for structural test generation, in: Proceedings of the 19th International Symposium on Software Testing and Analysis, 2010, pp. 183–194. S. Thummalapenta, T. Xie, N. Tillmann, J. de Halleux, Z. Su, Synthesizing method sequences for high-coverage testing, in: Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, 2011, pp. 189–206. Păsăreanu, Visser (b0195) 2009; 11 C. Cowan, P. Wagle, C. Pu, S. Beattie, J. Walpole, Buffer overflows: attacks and defenses for the vulnerability of the decade, in: Proceedings of DARPA Information Survivability Conference and Exposition, 2000, pp. 119–129. K. Ku, T.E. Hart, M. Chechik, D. Lie, A buffer overflow benchmark for software model checkers, in: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, 2007, pp. 389–392. M. Harman, The current state and future of search based software engineering, in: Future of Software Engineering, 2007, pp. 342–357. E. Bounimova, P. Godefroid, D.A. Molnar, Billions and billions of constraints: whitebox fuzz testing in production, in: Proceedings of the 2013 International Conference on Software Engineering, 2013, pp. 122–131. Common Vulnerabilities and Exposures Lakhotia, Harman, Gross (b0170) 2013; 55 C. Cadar, D. Dunbar, D.R. Engler, KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs, in: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, 2008, pp. 209–224. Cadar, Sen (b0070) Feb. 2013; 56 Clarke (b0040) May 1976; 2 C. Cadar, P. Godefroid, S. Khurshid, C.S. Păsăreanu, K. Sen, N. Tillmann, W. Visser, Symbolic execution for software testing in practice. preliminary assessment, in: Proceedings of the 33rd International Conference on Software Engineering, 2011, pp. 1066–1071. P. Godefroid, Compositional dynamic test generation, in: Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2007, pp. 47–54. D. Wagner, J.S. Foster, E.A. Brewer, A. Aiken, A first step towards automated detection of buffer overrun vulnerabilities, in: Proceedings of the Network and Distributed System Security Symposium, 2000. P. Godefroid, N. Klarlund, K. Sen, DART: directed automated random testing, in: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2005, pp. 213–223. McMinn, Holcombe (b0185) 2006; 14 R.A. Santelices, M.J. Harrold, Exploiting program dependencies for scalable multiple-path symbolic execution, in: Proceedings of the 19th International Symposium on Software Testing and Analysis, 2010, pp. 195–206. N. Tillmann, J. de Halleux, Pex – white box test generation for.NET, in: Proceedings of the 2nd International Conference on Tests and Proofs, 2008, pp. 134–153. V. Kuznetsov, J. Kinder, S. Bucur, G. Candea, Efficient state merging in symbolic execution, in: Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012, pp. 193–204. 10.1016/j.infsof.2015.05.007_b0200 10.1016/j.infsof.2015.05.007_b0245 10.1016/j.infsof.2015.05.007_b0165 10.1016/j.infsof.2015.05.007_b0045 Lakhotia (10.1016/j.infsof.2015.05.007_b0170) 2013; 55 10.1016/j.infsof.2015.05.007_b0205 10.1016/j.infsof.2015.05.007_b0125 10.1016/j.infsof.2015.05.007_b0005 10.1016/j.infsof.2015.05.007_b0160 10.1016/j.infsof.2015.05.007_b0080 Ferguson (10.1016/j.infsof.2015.05.007_b0100) 1996; 5 Binkley (10.1016/j.infsof.2015.05.007_b0030) 2011; 20 10.1016/j.infsof.2015.05.007_b0240 10.1016/j.infsof.2015.05.007_b0120 10.1016/j.infsof.2015.05.007_b0085 Clarke (10.1016/j.infsof.2015.05.007_b0050) 2003; 150 Clarke (10.1016/j.infsof.2015.05.007_b0040) 1976; 2 10.1016/j.infsof.2015.05.007_b0035 10.1016/j.infsof.2015.05.007_b0110 10.1016/j.infsof.2015.05.007_b0155 10.1016/j.infsof.2015.05.007_b0235 10.1016/j.infsof.2015.05.007_b0115 King (10.1016/j.infsof.2015.05.007_b0150) 1976; 19 10.1016/j.infsof.2015.05.007_b0190 10.1016/j.infsof.2015.05.007_b0075 Del Grosso (10.1016/j.infsof.2015.05.007_b0090) 2008; 35 10.1016/j.infsof.2015.05.007_b0230 Baluda (10.1016/j.infsof.2015.05.007_b0020) 2011; 19 10.1016/j.infsof.2015.05.007_b0145 Păsăreanu (10.1016/j.infsof.2015.05.007_b0195) 2009; 11 10.1016/j.infsof.2015.05.007_b0025 10.1016/j.infsof.2015.05.007_b0220 10.1016/j.infsof.2015.05.007_b0105 McMinn (10.1016/j.infsof.2015.05.007_b0185) 2006; 14 10.1016/j.infsof.2015.05.007_b0225 10.1016/j.infsof.2015.05.007_b0180 10.1016/j.infsof.2015.05.007_b0065 Cadar (10.1016/j.infsof.2015.05.007_b0060) 2008; 12 10.1016/j.infsof.2015.05.007_b0260 10.1016/j.infsof.2015.05.007_b0255 10.1016/j.infsof.2015.05.007_b0135 10.1016/j.infsof.2015.05.007_b0055 10.1016/j.infsof.2015.05.007_b0210 10.1016/j.infsof.2015.05.007_b0215 Do (10.1016/j.infsof.2015.05.007_b0095) 2013; vol. 410 10.1016/j.infsof.2015.05.007_b0015 10.1016/j.infsof.2015.05.007_b0010 10.1016/j.infsof.2015.05.007_b0175 10.1016/j.infsof.2015.05.007_b0250 Cadar (10.1016/j.infsof.2015.05.007_b0070) 2013; 56 Godefroid (10.1016/j.infsof.2015.05.007_b0130) 2012; 55 Harman (10.1016/j.infsof.2015.05.007_b0140) 2012; 45 |
| References_xml | – reference: P. Godefroid, N. Klarlund, K. Sen, DART: directed automated random testing, in: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2005, pp. 213–223. – reference: S. Anand, M. Naik, M.J. Harrold, H. Yang, Automated concolic testing of smartphone apps, in: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, 2012. – reference: E. Bounimova, P. Godefroid, D.A. Molnar, Billions and billions of constraints: whitebox fuzz testing in production, in: Proceedings of the 2013 International Conference on Software Engineering, 2013, pp. 122–131. – reference: C. Cadar, P. Godefroid, S. Khurshid, C.S. Păsăreanu, K. Sen, N. Tillmann, W. Visser, Symbolic execution for software testing in practice. preliminary assessment, in: Proceedings of the 33rd International Conference on Software Engineering, 2011, pp. 1066–1071. – reference: J. Condit, M. Harren, Z.R. Anderson, D. Gay, G.C. Necula, Dependent types for low-level programming, in: Proceedings of the 16th European Conference on Programming, 2007, pp. 520–535. – reference: N. Rungta, E.G. Mercer, W. Visser, Efficient testing of concurrent programs with abstraction-guided symbolic execution, in: Proceedings of the 16th International SPIN Workshop on Model Checking Software, 2009, pp. 174–191. – reference: S. Anand, C.S. Păsăreanu, W. Visser, Symbolic execution with abstract subsumption checking, in: Proceedings of the 13th International SPIN Workshop on Model Checking Software, 2006, pp. 163–181. – volume: 19 start-page: 725 year: Dec. 2011 end-page: 751 ident: b0020 article-title: Enhancing structural software coverage by incrementally computing branch executability publication-title: Software Qual. J. – reference: C. Cowan, P. Wagle, C. Pu, S. Beattie, J. Walpole, Buffer overflows: attacks and defenses for the vulnerability of the decade, in: Proceedings of DARPA Information Survivability Conference and Exposition, 2000, pp. 119–129. – reference: D.A. Molnar, Dynamic Test Generation for Large Binary Programs, Ph.D. Dissertation, University of California, Berkeley, 2009. – volume: 12 year: Dec. 2008 ident: b0060 article-title: EXE: automatically generating inputs of death publication-title: ACM Trans. Inform. Syst. Secur. – reference: N. Tillmann, J. de Halleux, Pex – white box test generation for.NET, in: Proceedings of the 2nd International Conference on Tests and Proofs, 2008, pp. 134–153. – volume: 20 year: 2011 ident: b0030 article-title: FlagRemover: a testability transformation for transforming loop-assigned flags publication-title: ACM Trans. Softw. Eng. Methodol. – volume: 14 year: 2006 ident: b0185 article-title: Evolutionary testing using an extended chaining approach publication-title: Evol. Comput. – reference: T. Xie, N. Tillmann, J. de Halleux, W. Schulte, Fitness–guided path exploration in dynamic symbolic execution, in: Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2009, pp. 359–368. – reference: P. Godefroid, M.Y. Levin, D.A. Molnar, Active property checking, in: Proceedings of the 8th ACM International Conference on Embedded Software, 2008, pp. 207–216. – reference: P. Godefroid, M.Y. Levin, D.A. Molnar, Automated whitebox fuzz testing, in: Proceedings of Network and Distributed Systems Security, 2008. – reference: S. Person, G. Yang, N. Rungta, S. Khurshid, Directed incremental symbolic execution, in: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011, pp. 504–515. – reference: J.E. Forrester, B.P. Miller, An empirical study of the robustness of Windows NT applications using random testing, in: Proceedings of the 4th Conference on USENIX Windows Systems Symposium, 2000, pp. 6–6. – volume: 55 start-page: 40 year: 2012 end-page: 44 ident: b0130 article-title: SAGE: whitebox fuzzing for security testing publication-title: Commun. ACM – volume: 55 year: 2013 ident: b0170 article-title: AUSTIN: an open source tool for search based software testing of C programs publication-title: Inf. Softw. Technol. – volume: 35 start-page: 3125 year: 2008 end-page: 3143 ident: b0090 article-title: Detecting buffer overflow via automatic test input data generation publication-title: Comput. Oper. Res. – reference: O. Ruwase, M.S. Lam, A practical dynamic buffer overflow detector, in: Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004. – reference: V. Kuznetsov, J. Kinder, S. Bucur, G. Candea, Efficient state merging in symbolic execution, in: Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012, pp. 193–204. – reference: M. Staats, C.S. Păsăreanu, Parallel symbolic execution for structural test generation, in: Proceedings of the 19th International Symposium on Software Testing and Analysis, 2010, pp. 183–194. – reference: C.S. Jensen, M.R. Prasad, A. Møller, Automated testing with targeted event sequence generation, in: Proceedings of the 2013 International Symposium on Software Testing and Analysis, 2013, pp. 67–77. – reference: R.A. Santelices, M.J. Harrold, Exploiting program dependencies for scalable multiple-path symbolic execution, in: Proceedings of the 19th International Symposium on Software Testing and Analysis, 2010, pp. 195–206. – reference: K.K. Ma, Y.P. Khoo, J.S. Foster, M. Hicks, Directed symbolic execution, in: Proceedings of the 18th International Conference on Static Analysis, 2011, pp. 95–111. – volume: vol. 410 start-page: 3 year: 2013 end-page: 15 ident: b0095 article-title: Dynamic symbolic execution guided by data dependency analysis for high structural coverage publication-title: Communications in Computer and Information Science – reference: P. Godefroid, Compositional dynamic test generation, in: Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2007, pp. 47–54. – reference: K. Ku, T.E. Hart, M. Chechik, D. Lie, A buffer overflow benchmark for software model checkers, in: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, 2007, pp. 389–392. – volume: 150 start-page: 161 year: 2003 end-page: 175 ident: b0050 article-title: Reformulating software engineering as a search problem publication-title: IEE Proc. – Softw. – reference: S. Thummalapenta, T. Xie, N. Tillmann, J. de Halleux, Z. Su, Synthesizing method sequences for high-coverage testing, in: Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, 2011, pp. 189–206. – reference: Common Vulnerabilities and Exposures, < – volume: 2 start-page: 215 year: May 1976 end-page: 222 ident: b0040 article-title: A system to generate test data and symbolically execute programs publication-title: IEEE Trans. Softw. Eng. – reference: S. Arlt, A. Podelski, C. Bertolini, M. Schaf, I. Banerjee, A.M. Memon, Lightweight static analysis for GUI testing, in: Proceedings of the IEEE 23rd International Symposium on Software Reliability Engineering, 2012, pp. 301–310. – volume: 45 year: 2012 ident: b0140 article-title: Search-based software engineering: trends, techniques and applications publication-title: ACM Comput. Surv. – reference: C. Cadar, D. Dunbar, D.R. Engler, KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs, in: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, 2008, pp. 209–224. – reference: C. Lattner, V.S. Adve, LLVM: a compilation framework for lifelong program analysis and transformation, in: Proceedings of the International Symposium on Code Generation and Optimization: Feedback-Directed and Runtime Optimization, 2004, pp. 75–88. – volume: 11 start-page: 339 year: 2009 end-page: 353 ident: b0195 article-title: A survey of new trends in symbolic execution for software testing and analysis publication-title: Softw. Tools Technol. Transfer – reference: Common Weakness Enumeration, The 2011 CWE/SANS Top 25 Most Dangerous Software Errors. < – volume: 5 start-page: 63 year: 1996 end-page: 86 ident: b0100 article-title: The chaining approach for software test data generation publication-title: ACM Trans. Softw. Eng. Methodol. – volume: 19 start-page: 385 year: 1976 end-page: 394 ident: b0150 article-title: Symbolic execution and program testing publication-title: Commun. ACM – reference: K. Lakhotia, N. Tillmann, M. Harman, J. de Halleux, FloPSy: search-based floating point constraint solving for symbolic execution, in: Proceedings of the 22nd IFIP WG 6.1 International Conference on Testing Software and Systems, 2010, pp. 142–157. – reference: M. Harman, The current state and future of search based software engineering, in: Future of Software Engineering, 2007, pp. 342–357. – reference: D. Wagner, J.S. Foster, E.A. Brewer, A. Aiken, A first step towards automated detection of buffer overrun vulnerabilities, in: Proceedings of the Network and Distributed System Security Symposium, 2000. – reference: >. – reference: M. Weiser, Program slicing, in: Proceedings of the 5th International Conference on Software Engineering, 1981, pp. 439–449. – reference: B. Xin, X. Zhang, Efficient online detection of dynamic control dependence, in: Proceedings of the 2007 International Symposium on Software Testing and Analysis, 2007, pp. 185–195. – volume: 56 start-page: 82 year: Feb. 2013 end-page: 90 ident: b0070 article-title: Symbolic execution for software testing: three decades later publication-title: Commun. ACM – reference: K. Sen, D. Marinov, G. Agha, CUTE: a concolic unit testing engine for C, in: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, pp. 263–272. – reference: D. Qi, H.D.T. Nguyen, A. Roychoudhury, Path exploration based on symbolic output, in: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, 2011, pp. 278–288. – reference: J. Burnim, K. Sen, Heuristics for scalable dynamic test generation, in: Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, 2008, pp. 443–446. – ident: 10.1016/j.infsof.2015.05.007_b0035 doi: 10.1109/ASE.2008.69 – ident: 10.1016/j.infsof.2015.05.007_b0045 – volume: 45 issue: 1 year: 2012 ident: 10.1016/j.infsof.2015.05.007_b0140 article-title: Search-based software engineering: trends, techniques and applications publication-title: ACM Comput. Surv. doi: 10.1145/2379776.2379787 – ident: 10.1016/j.infsof.2015.05.007_b0175 doi: 10.1007/978-3-642-16573-3_11 – ident: 10.1016/j.infsof.2015.05.007_b0255 doi: 10.1109/DSN.2009.5270315 – ident: 10.1016/j.infsof.2015.05.007_b0115 doi: 10.1145/1065010.1065036 – volume: vol. 410 start-page: 3 year: 2013 ident: 10.1016/j.infsof.2015.05.007_b0095 article-title: Dynamic symbolic execution guided by data dependency analysis for high structural coverage – volume: 2 start-page: 215 year: 1976 ident: 10.1016/j.infsof.2015.05.007_b0040 article-title: A system to generate test data and symbolically execute programs publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.1976.233817 – volume: 35 start-page: 3125 issue: 10 year: 2008 ident: 10.1016/j.infsof.2015.05.007_b0090 article-title: Detecting buffer overflow via automatic test input data generation publication-title: Comput. Oper. Res. doi: 10.1016/j.cor.2007.01.013 – ident: 10.1016/j.infsof.2015.05.007_b0210 – ident: 10.1016/j.infsof.2015.05.007_b0225 doi: 10.1145/1081706.1081750 – ident: 10.1016/j.infsof.2015.05.007_b0205 doi: 10.1145/2025113.2025152 – ident: 10.1016/j.infsof.2015.05.007_b0230 doi: 10.1145/1831708.1831732 – volume: 19 start-page: 385 issue: July year: 1976 ident: 10.1016/j.infsof.2015.05.007_b0150 article-title: Symbolic execution and program testing publication-title: Commun. ACM doi: 10.1145/360248.360252 – ident: 10.1016/j.infsof.2015.05.007_b0010 doi: 10.1109/ISSRE.2012.25 – ident: 10.1016/j.infsof.2015.05.007_b0105 – volume: 20 issue: 12 year: 2011 ident: 10.1016/j.infsof.2015.05.007_b0030 article-title: FlagRemover: a testability transformation for transforming loop-assigned flags publication-title: ACM Trans. Softw. Eng. Methodol. – ident: 10.1016/j.infsof.2015.05.007_b0065 doi: 10.1007/978-3-540-71316-6_35 – ident: 10.1016/j.infsof.2015.05.007_b0110 doi: 10.1145/1190216.1190226 – ident: 10.1016/j.infsof.2015.05.007_b0125 doi: 10.1145/1450058.1450087 – volume: 5 start-page: 63 year: 1996 ident: 10.1016/j.infsof.2015.05.007_b0100 article-title: The chaining approach for software test data generation publication-title: ACM Trans. Softw. Eng. Methodol. doi: 10.1145/226155.226158 – ident: 10.1016/j.infsof.2015.05.007_b0160 doi: 10.1145/2254064.2254088 – ident: 10.1016/j.infsof.2015.05.007_b0245 – ident: 10.1016/j.infsof.2015.05.007_b0075 – volume: 12 issue: 10 year: 2008 ident: 10.1016/j.infsof.2015.05.007_b0060 article-title: EXE: automatically generating inputs of death publication-title: ACM Trans. Inform. Syst. Secur. – ident: 10.1016/j.infsof.2015.05.007_b0085 doi: 10.1109/DISCEX.2000.821514 – volume: 56 start-page: 82 year: 2013 ident: 10.1016/j.infsof.2015.05.007_b0070 article-title: Symbolic execution for software testing: three decades later publication-title: Commun. ACM doi: 10.1145/2408776.2408795 – ident: 10.1016/j.infsof.2015.05.007_b0180 – ident: 10.1016/j.infsof.2015.05.007_b0015 doi: 10.1007/11691617_10 – ident: 10.1016/j.infsof.2015.05.007_b0215 doi: 10.1007/978-3-642-02652-2_16 – volume: 55 start-page: 40 issue: 3 year: 2012 ident: 10.1016/j.infsof.2015.05.007_b0130 article-title: SAGE: whitebox fuzzing for security testing publication-title: Commun. ACM doi: 10.1145/2093548.2093564 – ident: 10.1016/j.infsof.2015.05.007_b0145 doi: 10.1145/2483760.2483777 – ident: 10.1016/j.infsof.2015.05.007_b0235 doi: 10.1007/978-3-540-79124-9_10 – ident: 10.1016/j.infsof.2015.05.007_b0220 doi: 10.1145/1831708.1831733 – ident: 10.1016/j.infsof.2015.05.007_b0135 doi: 10.1109/FOSE.2007.29 – ident: 10.1016/j.infsof.2015.05.007_b0025 doi: 10.1109/ICSE.2013.6606558 – ident: 10.1016/j.infsof.2015.05.007_b0055 doi: 10.1145/1985793.1985995 – ident: 10.1016/j.infsof.2015.05.007_b0080 – volume: 14 issue: 1 year: 2006 ident: 10.1016/j.infsof.2015.05.007_b0185 article-title: Evolutionary testing using an extended chaining approach publication-title: Evol. Comput. doi: 10.1162/evco.2006.14.1.41 – volume: 11 start-page: 339 issue: October year: 2009 ident: 10.1016/j.infsof.2015.05.007_b0195 article-title: A survey of new trends in symbolic execution for software testing and analysis publication-title: Softw. Tools Technol. Transfer doi: 10.1007/s10009-009-0118-1 – ident: 10.1016/j.infsof.2015.05.007_b0250 – volume: 55 issue: 1 year: 2013 ident: 10.1016/j.infsof.2015.05.007_b0170 article-title: AUSTIN: an open source tool for search based software testing of C programs publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2012.03.009 – ident: 10.1016/j.infsof.2015.05.007_b0190 doi: 10.1007/978-3-642-23702-7_11 – ident: 10.1016/j.infsof.2015.05.007_b0200 doi: 10.1145/1993498.1993558 – ident: 10.1016/j.infsof.2015.05.007_b0165 doi: 10.1109/CGO.2004.1281665 – ident: 10.1016/j.infsof.2015.05.007_b0120 – ident: 10.1016/j.infsof.2015.05.007_b0260 doi: 10.1145/1273463.1273489 – ident: 10.1016/j.infsof.2015.05.007_b0240 doi: 10.1145/2048066.2048083 – ident: 10.1016/j.infsof.2015.05.007_b0005 doi: 10.1145/2393596.2393666 – ident: 10.1016/j.infsof.2015.05.007_b0155 doi: 10.1145/1321631.1321691 – volume: 19 start-page: 725 year: 2011 ident: 10.1016/j.infsof.2015.05.007_b0020 article-title: Enhancing structural software coverage by incrementally computing branch executability publication-title: Software Qual. J. doi: 10.1007/s11219-011-9150-y – volume: 150 start-page: 161 issue: 3 year: 2003 ident: 10.1016/j.infsof.2015.05.007_b0050 article-title: Reformulating software engineering as a search problem publication-title: IEE Proc. – Softw. doi: 10.1049/ip-sen:20030559 |
| SSID | ssj0017030 |
| Score | 2.1296058 |
| Snippet | Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 40 |
| SubjectTerms | Algorithms Buffer overflow vulnerabilities Data and control dependence analysis Dynamic symbolic execution Security management Software Software quality Studies Type inference analysis |
| Title | Goal-oriented dynamic test generation |
| URI | https://dx.doi.org/10.1016/j.infsof.2015.05.007 https://www.proquest.com/docview/1693206195 |
| Volume | 66 |
| WOSCitedRecordID | wos000358699900004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1873-6025 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017030 issn: 0950-5849 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLZgQ4gXxFUMBsoDPFWWktjx5bEa486E2EB9i-LE1lqqZGrSsZ_PcY6Twio0QEKqotZuUtfn5Pjzl3Mh5LmQjqepFdQqzil3pqLKOkFZATttoxUT_RP8rx_k0ZGazfSnQOi3fTkBWdfq4kKf_VdRQxsI24fO_oW4x4tCA7wHocMRxA7HPxL866ZY0sanL_ZgssKK8xNAlJ0vl2xXG1EsBi_2MYJxgjS66757h7Bui3Z_2aBTkZ3WI438_rTpW4_nxZoenNqwFPYrGxqS6fJ83k6ga_1t8nG-6QdzjAXaPq_bNrjuBwIiyUZXtsCKbUXGBHoxpgBu0BxaNK5KMipiDHQerK_42Xxi5qawEGPi6i0Tj2zDwu9LYD68c17W517F4rmXkmcf-3H4YQDu9TtPfp3spjLTYP92p28PZ-_GJ07e8mFeRhz3EGbZ-wJu_9bvYMylBb1HKSd3yO2wvYimqBZ3yTVb3yM3h-iG--TFL9oRBe2IvHZEG-14QL68Ojw5eENDpQxaMsY7aksZ26zy7JRgiTMlB-BWicylLjNJabVQNtMutZ6PUB6yVbpgLi0N9BlVsIdkp25q-4hEDPqMsE4qYzjX1miRlDF8drBXSHSxR9jwx_MypJH31UyW-eAvuMhxunI_XXkMr1juETqedYZpVK74vhzmNA9QECFeDmpwxZn7gwjycFe2uc84lAJy1dnjf77wE3Jro_37ZKdbre1TcqM87-bt6llQpx-lxo1A |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Goal-oriented+dynamic+test+generation&rft.jtitle=Information+and+software+technology&rft.au=Do%2C+TheAnh&rft.au=Khoo%2C+Siau-Cheng&rft.au=Fong%2C+Alvis+Cheuk+Ming&rft.au=Pears%2C+Russel&rft.date=2015-10-01&rft.pub=Elsevier+B.V&rft.issn=0950-5849&rft.eissn=1873-6025&rft.volume=66&rft.spage=40&rft.epage=57&rft_id=info:doi/10.1016%2Fj.infsof.2015.05.007&rft.externalDocID=S0950584915001044 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0950-5849&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0950-5849&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0950-5849&client=summon |