Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software 2017
DOI: 10.1145/3092282.3092295
|View full text |Cite
|
Sign up to set email alerts
|

ExpoSE: practical symbolic execution of standalone JavaScript

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 10 publications
0
23
0
Order By: Relevance
“…We now describe an implementation of our approach in the DSE engine ExpoSE 1 [27]. We explain how to model the regex API with capturing language membership ( §6.1) and give a brief overview of ExpoSE ( §6.2).…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We now describe an implementation of our approach in the DSE engine ExpoSE 1 [27]. We explain how to model the regex API with capturing language membership ( §6.1) and give a brief overview of ExpoSE ( §6.2).…”
Section: Methodsmentioning
confidence: 99%
“…Several testing and verification tools include some degree of support for regular expressions because they are so common [24,27,29,34,37]. In particular, SMT (satisfiability modulo theory) solvers now often support theories for strings and classical regular expressions [1,2,6,15,25,26,34,[38][39][40], which allow expressing constraints such as s ∈ L(goo+d) for the test example above.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To the best of our knowledge, the only mature SMT solvers that currently support all the theories it requires are Z3 and CVC4. Note that previous systems such as Kudzu [41], Jalangi [45], SymJS [30] and ExpoSE [34] were all designed for use with particular constraint solvers. As such, our implementation is the first multi-solver DSE tool.…”
Section: Backend Solving and Optimizationsmentioning
confidence: 99%
“…Popular methods for analysing how strings are being manipulated by a program include symbolic executions [Bjùrner et al 2009;Cadar et al 2008Cadar et al , 2011Godefroid et al 2005;Kausler and Sherman 2014;Loring et al 2017;Redelinghuys et al 2012;Saxena et al 2010;Sen et al 2013] which at their core use constraint solvers over the string domain (a.k.a. string solvers).…”
Section: Introductionmentioning
confidence: 99%