2021
DOI: 10.1007/978-3-030-81685-8_32
|View full text |Cite
|
Sign up to set email alerts
|

Not All Bugs Are Created Equal, But Robust Reachability Can Tell the Difference

Abstract: This paper introduces a new property called robust reachability which refines the standard notion of reachability in order to take replicability into account. A bug is robustly reachable if a controlled input can make it so the bug is reached whatever the value of uncontrolled input. Robust reachability is better suited than standard reachability in many realistic situations related to security (e.g., criticality assessment or bug prioritization) or software engineering (e.g., replicable test suites and flakin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 44 publications
0
6
0
Order By: Relevance
“…Finally, the last but not the least of the tools under our scope is binsec. In [2], Girol, Farinier and Bardin consider another application of symbolic computations: bug tracking.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the last but not the least of the tools under our scope is binsec. In [2], Girol, Farinier and Bardin consider another application of symbolic computations: bug tracking.…”
Section: Introductionmentioning
confidence: 99%
“…The program property of robust reachability [8,9] refines the standard notion of reachability of a bug given a partition of the program variables in a controlled and an uncontrolled set: a bug is robustly reachable if it is reachable whatever the values of the uncontrolled variables. FuncTion -V can analyze robust reachability properties expressible as a CTL formula of the form AFϕ.…”
Section: Related Workmentioning
confidence: 99%
“…Violations of program properties pose significant risks, particularly when they can be triggered by attackers [8,14]. This paper presents our tool FuncTion -V for the automatic identification of the minimal set(s) of program variables that are vulnerable to be controlled by an attacker to potentially violate a (desirable) program property, or, equivalently, the minimal variable set(s) the values of which must be controlled to ensure an (undesirable) program property.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations