Proceedings of the 2nd International Workshop on Defects in Large Software Systems: Held in Conjunction With the ACM SIGSOFT In 2009
DOI: 10.1145/1555860.1555868
|View full text |Cite
|
Sign up to set email alerts
|

Efficient symbolic execution of strings for validating web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 2 publications
0
13
0
Order By: Relevance
“…The automaton refinement scheme in Item 1 is quite different from existing automaton-based ones. One of the first attempts at solving hybrid constraints using automata in the string domain is described in our earlier work [11]. This paper summarizes the advances that we have made in the solver after that.…”
Section: Background and Motivating Examplementioning
confidence: 98%
“…The automaton refinement scheme in Item 1 is quite different from existing automaton-based ones. One of the first attempts at solving hybrid constraints using automata in the string domain is described in our earlier work [11]. This paper summarizes the advances that we have made in the solver after that.…”
Section: Background and Motivating Examplementioning
confidence: 98%
“…Other solvers [9,24,13,14,27,31,26,2,21] that work exclusively in the string domain have similar limitations.…”
Section: Motivating Examplementioning
confidence: 99%
“…Based on the underlining representation, existing string analyses can be roughly categorized into two kinds: automatabased [9,24,13,14,27,31,26,2,21] and bit-vector-based [17,22,8,21]. We have made comparison with a number of these existing works [17,22,33,26] in Sections 2 and 4.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, we intersect this automaton with the one accepting all words of length 2 to get the final automaton. Due to space constraint we will skip the details of implementing the new operations, which we extend from [16,9].…”
Section: Enhancement With Automaton Based Modelmentioning
confidence: 99%
“…Automaton based model [16,21,18,20,11,9]. A string is modeled by an automaton which accepts all possible values of this string.…”
Section: Introductionmentioning
confidence: 99%