2013 13th International Conference on Quality Software 2013
DOI: 10.1109/qsic.2013.49
|View full text |Cite
|
Sign up to set email alerts
|

Binary-Level Testing of Embedded Programs

Abstract: Abstract-Dynamic Symbolic Execution (DSE) is a powerful approach to automatic test data generation. It has been heavily used in recent years for finding bugs in desktop programs. In this article, we discuss the use of binary-level DSE for testing safetycritical embedded systems. More especially, we present several innovative features implemented in our DSE tool OSMOSE, and we show through four case-studies how these features can be used in practical situations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…This approach allows to precisely define a wide-range of exploration strategies. Several strategies are already implemented such as DFS, BFS, random path, MinCall-DFS and MinCall-BFS [1].…”
Section: Path Selectionmentioning
confidence: 99%
“…This approach allows to precisely define a wide-range of exploration strategies. Several strategies are already implemented such as DFS, BFS, random path, MinCall-DFS and MinCall-BFS [1].…”
Section: Path Selectionmentioning
confidence: 99%
“…This program is therefore vulnerable: variable buf can be overflowed at lines 7 and 8. In both cases, the pointer ptr could be overwritten 3 , potentially hijacking the function call at line 9.…”
Section: The Case For Dedicated C/s Policiesmentioning
confidence: 99%
“…SE has quickly become the most promising technique for code-based automatic test generation, leading to impressive case studies [12,16,2,14] and a promise of industrial adoption at large scale [9,22]. Its usage for security purposes have also been considered, especially because of its straightforward adaptation to binary-level analysis [22,4,27,3]. SE has successfully been applied in a wide range of security applications, such as vulnerability [1,23] or malware analysis [10].…”
Section: Introductionmentioning
confidence: 99%
“…Object-Branch Coverage (OBC) is a structural coverage criterion at the object-code level which requires that a test suite executes both branches of conditional jumps [1]. It is frequently used as a measure of the thoroughness of tests suites in safety critical domains [2], [3], augmenting or substituting source-code based structural criteria such as (source code) branch coverage and modified condition/decision coverage (MC/DC). OBC may also be used in aeronautics, as DO-178C [?]…”
Section: Introductionmentioning
confidence: 99%