Sept. 9, 2022, 1:20 a.m. | Darya Parygina, Alexey Vishnyakov, Andrey Fedotov

cs.CR updates on arXiv.org arxiv.org

Dynamic symbolic execution (DSE) is an effective method for automated program
testing and bug detection. It is increasing the code coverage by the complex
branches exploration during hybrid fuzzing. DSE tools invert the branches along
some execution path and help fuzzer examine previously unavailable program
parts. DSE often faces over- and underconstraint problems. The first one leads
to significant analysis complication while the second one causes inaccurate
symbolic execution.


We propose strong optimistic solving method that eliminates irrelevant path
predicate …

dynamic symbolic execution

Principal - Cyber Risk and Assurance - Infra/Network

@ GSK | Bengaluru Luxor North Tower

Staff Security Engineer

@ Airwallex | AU - Melbourne

Chief Information Security Officer

@ Australian Payments Plus | Sydney, New South Wales, Australia

TW Test Automation Engineer (Access Control & Intrusion Systems)

@ Bosch Group | Taipei, Taiwan

Consultant infrastructure sécurité H/F

@ Hifield | Sèvres, France

SOC Analyst

@ Wix | Tel Aviv, Israel