2019
DOI: 10.1145/3290362
|View full text |Cite
|
Sign up to set email alerts
|

Decision procedures for path feasibility of string-manipulating programs with complex operations

Abstract: The design and implementation of decision procedures for checking path feasibility in string-manipulating programs is an important problem, with such applications as symbolic execution of programs with strings and automated detection of cross-site scripting (XSS) vulnerabilities in web applications. A (symbolic) path is given as a finite sequence of assignments and assertions (i.e. without loops), and checking its feasibility amounts to determining the existence of inputs that yield a successful execution. Mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(83 citation statements)
references
References 53 publications
0
83
0
Order By: Relevance
“…In [34] Chen et al define a first-order language based on the .NET string library functions and prove some decidability properties for (fragments of) that language. In particular, based on the work of [31], the authors prove that undecidablity of the path feasibility problem for a fragment called library language.…”
Section: Theoretical Aspectsmentioning
confidence: 99%
“…In [34] Chen et al define a first-order language based on the .NET string library functions and prove some decidability properties for (fragments of) that language. In particular, based on the work of [31], the authors prove that undecidablity of the path feasibility problem for a fragment called library language.…”
Section: Theoretical Aspectsmentioning
confidence: 99%
“…Trau [1] reduces certain extended functions, such as replace, to context-free membership constraints. Ostrich [7] implements a decision procedure for a subset of constraints that include extended string functions. The simplification techniques presented in this paper are agnostic to the underlying solving procedure, so they can be combined with all of these approaches.…”
Section: -Extensions Of This Technique For Showing Containment Relatimentioning
confidence: 99%
“…We also conducted experiments to compare our procedure with SLOTH [16] and OSTRICH [12]. All the test cases use the 8bit extended ASCII alphabet.…”
Section: Q| |X| |δ|mentioning
confidence: 99%
“…Chen et al developed a framework that solves straight-line string constraints by computing pre-image of regular languages under transductions [12]. It supports constraints that satisfy two specific restrictions RegMonDec and RegInvRel.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation