Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering 2018
DOI: 10.1145/3238147.3238189
|View full text |Cite
|
Sign up to set email alerts
|

A symbolic model checking approach to the analysis of string and length constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…Solvers typically use a combination of techniques to check the satisfiability of string constraints, including word-based methods, automata-based methods, and unfolding-based methods like the translation to bit-vector constraints. We mention among others the following string solvers: Z3 [de Moura and Bjùrner 2008], CVC4 [Liang et al 2014], Z3-str/2/3/4 [Berzish et al 2017;Berzish, Murphy 2021;Zheng et al 2015Zheng et al , 2013, ABC [Bultan and contributors 2015], Norn [Abdulla et al 2014], Trau [Abdulla et al 2017Bui and contributors 2019], OSTRICH [Chen et al 2019], S2S [Le and He 2018], Qzy [Cox and Leasure 2017], Stranger [Yu et al 2010], Sloth [Abdulla et al 2019;, Slog [Wang et al 2016], Slent [Wang et al 2018], Gecode+S [Scott et al 2017], G-Strings [Amadini et al 2017], HAMPI [Kiezun et al 2012], and S3 [Trinh et al 2014]. Most modern string solvers provide support of concatenation and regular constraints.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Solvers typically use a combination of techniques to check the satisfiability of string constraints, including word-based methods, automata-based methods, and unfolding-based methods like the translation to bit-vector constraints. We mention among others the following string solvers: Z3 [de Moura and Bjùrner 2008], CVC4 [Liang et al 2014], Z3-str/2/3/4 [Berzish et al 2017;Berzish, Murphy 2021;Zheng et al 2015Zheng et al , 2013, ABC [Bultan and contributors 2015], Norn [Abdulla et al 2014], Trau [Abdulla et al 2017Bui and contributors 2019], OSTRICH [Chen et al 2019], S2S [Le and He 2018], Qzy [Cox and Leasure 2017], Stranger [Yu et al 2010], Sloth [Abdulla et al 2019;, Slog [Wang et al 2016], Slent [Wang et al 2018], Gecode+S [Scott et al 2017], G-Strings [Amadini et al 2017], HAMPI [Kiezun et al 2012], and S3 [Trinh et al 2014]. Most modern string solvers provide support of concatenation and regular constraints.…”
Section: Related Workmentioning
confidence: 99%
“…One powerful method for identifying such bugs in programs is symbolic execution (possibly in combination with dynamic analysis), which analyses symbolic paths in a program by viewing them as constraints whose feasibility is checked by constraint solvers. Together with the challenging problem of string analysis, this interplay between program analysis and constraint solvers has motivated the highly active research area of string solving, resulting in the development of numerous string solvers in the last decade or so including Z3 [de Moura and Bjùrner 2008], CVC4 [Liang et al 2014], Z3-str/2/3/4 [Berzish et al 2017;Berzish, Murphy 2021;Zheng et al 2015Zheng et al , 2013, ABC [Bultan and contributors 2015], Norn [Abdulla et al 2014], Trau [Abdulla et al 2017Bui and contributors 2019], OSTRICH [Chen et al 2019], S2S [Le and He 2018], Qzy [Cox and Leasure 2017], Stranger [Yu et al 2010], Sloth [Abdulla et al 2019;, Slog [Wang et al 2016], Slent [Wang et al 2018], Gecode+S [Scott et al 2017], G-Strings [Amadini et al 2017], HAMPI [Kiezun et al 2012], among many others.…”
Section: Introductionmentioning
confidence: 99%
“…1. A program that counts the occurrences of a string into another one the context of string constraints verification, focusing on the study of decidable fragments of the string constraint formulas [3] or proposing new efficient decidable procedures or string constraints representations [3,5,11] also based on automata, such as [33,34], or involving type conversion string constraints [1].…”
Section: Related Workmentioning
confidence: 99%
“…Solvers typically use a combination of techniques to check the satisfiability of string constraints, including word-based methods, automata-based methods, and unfolding-based methods like the translation to bit-vector constraints. We mention among others the following string solvers: Z3 [de Moura and Bjørner 2008], CVC4 [Liang et al 2014], Z3-str/2/3/4 [Berzish et al 2017;Berzish, Murphy 2021;Zheng et al 2015Zheng et al , 2013, ABC [Bultan and contributors 2015], Norn [Abdulla et al 2014], Trau [Abdulla et al 2017Bui and contributors 2019], OSTRICH [Chen et al 2019], S2S [Le and He 2018], Qzy [Cox and Leasure 2017], Stranger [Yu et al 2010], Sloth [Abdulla et al 2019;, Slog [Wang et al 2016], Slent [Wang et al 2018], Gecode+S [Scott et al 2017], G-Strings [Amadini et al 2017], HAMPI [Kiezun et al 2012], and S3 [Trinh et al 2014]. Most modern string solvers provide support of concatenation and regular constraints.…”
Section: Related Workmentioning
confidence: 99%
“…One powerful method for identifying such bugs in programs is symbolic execution (possibly in combination with dynamic analysis), which analyses symbolic paths in a program by viewing them as constraints whose feasibility is checked by constraint solvers. Together with the challenging problem of string analysis, this interplay between program analysis and constraint solvers has motivated the highly active research area of string solving, resulting in the development of numerous string solvers in the last decade or so including Z3 [de Moura and Bjørner 2008], CVC4 [Liang et al 2014], Z3-str/2/3/4 [Berzish et al 2017;Berzish, Murphy 2021;Zheng et al 2015Zheng et al , 2013, ABC [Bultan and contributors 2015], Norn [Abdulla et al 2014], Trau [Abdulla et al 2017Bui and contributors 2019], OSTRICH [Chen et al 2019], S2S [Le and He 2018], Qzy [Cox and Leasure 2017], Stranger [Yu et al 2010], Sloth [Abdulla et al 2019;, Slog [Wang et al 2016], Slent [Wang et al 2018], Gecode+S [Scott et al 2017], G-Strings [Amadini et al 2017], HAMPI [Kiezun et al 2012], among many others.…”
Section: Introductionmentioning
confidence: 99%