2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE) 2017
DOI: 10.1109/icse.2017.72
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic Model Extraction for Web Application Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…In recent years, Z3 [33] has been commonly used in analysis using formal methods [34]- [36]. Bocić and Bultan [37] used Z3 in web-related analysis and showed the model extraction for the Rails. However, Z3 is based on command lines and its outputs are in text format, and thus analysis of results obtained from complicated models, such as the web, needs significant effort.…”
Section: ) State-of-the-art Formal Methodsmentioning
confidence: 99%
“…In recent years, Z3 [33] has been commonly used in analysis using formal methods [34]- [36]. Bocić and Bultan [37] used Z3 in web-related analysis and showed the model extraction for the Rails. However, Z3 is based on command lines and its outputs are in text format, and thus analysis of results obtained from complicated models, such as the web, needs significant effort.…”
Section: ) State-of-the-art Formal Methodsmentioning
confidence: 99%
“…Model Extraction: There have been some interest in (semi-)automatically extracting models from software, which include extraction of relationships between features and computational units [46], object models [47], [48], finitestate models [49], [50], [51], dependence models [52], test scenarios conforming to some temporal logic formula defined over a data-flow graph [53], state predicates to guide state exploration of a cooperating model checker [54], a statistical language model [55], framework models for symbolic execution [56], symbolic data models for web applications [57], and behavioral models for USB firmware [13]. Our approach uses symbolic execution to extract protocol relevant constraints from firmware and it uses these constraints to learn a constraint-based model for the protocol of interest.…”
Section: Related Workmentioning
confidence: 99%
“…Model-based Software Engineering: The use of models in software engineering has enabled diverse applications such as program verification [15], testing [18], generation [47], and reuse [35]. The user may be tasked with providing a model specification written in a higher-level language, or a simplified model may be extracted automatically (if the target software already exists for analysis or execution).…”
Section: Related Workmentioning
confidence: 99%