{"id":"https://openalex.org/W2912813468","doi":"https://doi.org/10.1109/desec.2018.8625128","title":"Dynamic Path Pruning in Symbolic Execution","display_name":"Dynamic Path Pruning in Symbolic Execution","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2912813468","doi":"https://doi.org/10.1109/desec.2018.8625128","mag":"2912813468"},"language":"en","primary_location":{"id":"doi:10.1109/desec.2018.8625128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2018.8625128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082438389","display_name":"Ying-Shen Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ying-Shen Chen","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020190617","display_name":"Weining Chen","orcid":"https://orcid.org/0000-0001-7355-9487"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wei-Ning Chen","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083056279","display_name":"Che-Yu Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Che-Yu Wu","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031599880","display_name":"Hsu\u2010Chun Hsiao","orcid":"https://orcid.org/0000-0001-9592-6911"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hsu-Chun Hsiao","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016345761","display_name":"Shih-Kun Huang","orcid":"https://orcid.org/0000-0002-6766-4683"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shih-Kun Huang","raw_affiliation_strings":["Department of Computer Science, National Chiao Tung University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Chiao Tung University, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082438389"],"corresponding_institution_ids":["https://openalex.org/I16733864"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2404767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.9188514947891235},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7956178188323975},{"id":"https://openalex.org/keywords/satisfiability","display_name":"Satisfiability","score":0.7934295535087585},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.7873939871788025},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.7227011919021606},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.449604332447052},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4160526990890503},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34670114517211914},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.19746726751327515},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07203781604766846}],"concepts":[{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.9188514947891235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7956178188323975},{"id":"https://openalex.org/C168773769","wikidata":"https://www.wikidata.org/wiki/Q1350299","display_name":"Satisfiability","level":2,"score":0.7934295535087585},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.7873939871788025},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.7227011919021606},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.449604332447052},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4160526990890503},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34670114517211914},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.19746726751327515},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07203781604766846},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/desec.2018.8625128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2018.8625128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1457363419","https://openalex.org/W1480909796","https://openalex.org/W1634497122","https://openalex.org/W1964806843","https://openalex.org/W1970005004","https://openalex.org/W2000414759","https://openalex.org/W2042033151","https://openalex.org/W2091939272","https://openalex.org/W2096449544","https://openalex.org/W2101512909","https://openalex.org/W2107147876","https://openalex.org/W2119236311","https://openalex.org/W2132897303","https://openalex.org/W2137530017","https://openalex.org/W2164836255","https://openalex.org/W2296669295","https://openalex.org/W2514974017","https://openalex.org/W2574017551","https://openalex.org/W3160978791","https://openalex.org/W4240738830","https://openalex.org/W4242156770","https://openalex.org/W6628365534","https://openalex.org/W6641993632","https://openalex.org/W6677656270","https://openalex.org/W6731997105"],"related_works":["https://openalex.org/W2905722102","https://openalex.org/W2752815423","https://openalex.org/W4306251929","https://openalex.org/W2373300491","https://openalex.org/W345638404","https://openalex.org/W4295529944","https://openalex.org/W1212596013","https://openalex.org/W2378744544","https://openalex.org/W844671342","https://openalex.org/W2912813468"],"abstract_inverted_index":{"To":[0],"alleviate":[1],"path":[2,7,27,66,83,157],"explosion":[3],"in":[4,132,177,198],"symbolic":[5,21,129],"execution,":[6],"pruning":[8,28,67,158],"removes":[9],"unsatisfiable":[10],"paths":[11,93],"at":[12],"an":[13,126],"early":[14],"stage":[15],"before":[16],"they":[17],"multiply.":[18],"Although":[19],"existing":[20,155],"execution":[22,130],"platforms":[23],"have":[24],"implemented":[25,122],"several":[26],"strategies":[29,46,159],"to":[30,35,51,73,92,98,166],"determine":[31],"whether":[32],"and":[33,58,101,186,204],"when":[34],"check":[36,52],"a":[37,53,69,88,134,149],"path's":[38,54],"satisfiability,":[39],"it":[40],"remains":[41],"unclear":[42],"how":[43],"effective":[44],"these":[45],"are":[47,95],"because":[48],"the":[49,75,82,102,108,114,187,194,201],"time":[50,78,147,189],"satisfiability":[55],"is":[56,104,121,190],"non-negligible":[57],"may":[59],"vary":[60],"drastically.":[61],"This":[62],"work":[63],"proposes":[64],"dynamic":[65],"(DPP),":[68],"strategy":[70,197],"that":[71,94,141],"aims":[72],"minimize":[74],"overall":[76],"exploration":[77,146,188],"by":[79],"dynamically":[80],"adjusting":[81],"checking":[84,90],"rate.":[85],"DPP":[86,120,142,174],"assigns":[87],"higher":[89],"rate":[91],"more":[96],"likely":[97],"be":[99],"unsatisfiable,":[100],"likelihood":[103],"estimated":[105],"based":[106],"on":[107,123],"observed":[109,115],"program's":[110],"characteristics,":[111],"such":[112],"as":[113],"percentage":[116],"of":[117,125,152,181,183,193,200],"satisfiable":[118],"paths.":[119],"top":[124],"open":[127],"source":[128],"platform":[131],"only":[133],"few":[135],"hundred":[136],"lines.":[137],"Our":[138],"evaluation":[139],"confirms":[140],"consistently":[143],"achieves":[144],"near-optimal":[145],"for":[148],"wide":[150],"spectrum":[151],"programs,":[153],"whereas":[154],"static":[156,172,196],"suffer":[160],"from":[161],"unacceptable":[162],"worst-case":[163],"performance":[164],"due":[165],"their":[167],"program-independent":[168],"behaviors.":[169],"Compared":[170],"with":[171],"strategies,":[173],"performs":[175],"best":[176,195],"84%":[178],"(110":[179],"out":[180],"131)":[182],"CGC":[184],"binaries,":[185],"within":[191],"100-124%":[192],"95%":[199],"tested":[202],"handcrafted":[203],"coreutils":[205],"binaries.":[206]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
