[1] Michiel M D,Bonenfant A,Casse H,et al.Static loop bound analysis of C programs based on flow analysis and abstract interpretation[A].Proceedings of the 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications[C].Taiwan:IEEE Computer Society,2008.161-166.
[2] Gustafsson J,Ermedahl A,Sandberg C,et al.Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution[A].Proceedings of the 27th IEEE International Real-Time Systems Symposium[C].Rio de Janeiro:IEEE,2006.57-66.
[3] Knoop J,Kovacs L,et al.Symbolic loop bound computation for WCET analysis[A].Proceedings of the 8th International Conference on Perspectives of System Informatics[C].Berlin:Springer Verlag,2011.227-242.
[4] Wilhelm R,Engblom J,Ermedahl A,et al.The worst-case execution-time problem-overview of methods and survey of tools[J].ACM Transactions in Embedded Computing Systems,2008,7(3):1-53.
[5] Cadar C,Godefroid P,Khurshid S,et al.Symbolic execution for software testing in practice[A].Proceedings of the 33rd International Conference on Software Engineering[C].New York:ACM,2011.1066-1071.
[6] King J C.Symbolic execution and program testing[J].Communications of the ACM,1976,19(7):385-394.
[7] Xiao X,Li S,Xie T,et al.Characteristic studies of loop problems for structural test generation via symbolic execution[A].Proceedings of the 28th International Conference on Automated Software Engineering[C].California,IEEE,2013.246-256.
[8] Anand S,Pǒsǒreanu C S,Visser W.JPF-SE:A symbolic execution extension to java path finder[A].Proceedings of the 13th International Conferrence on Tools and Algorithms for the Construction and Analysis of Systems[C].Berlin:Springer-Verlag,2007.134-138.
[9] Cadar C,Dunbar D,Engler D.KLEE:Unassisted and automatic generation of high-coverage tests for complex systems programs[A].Proceedings of the 8th USENIX Conference on Operating systems design and implementation[C].California:USENIX Association,2008.209-224.
[10] Boonstoppel P,Cadar C,Engler D.RWset:Attacking path explosion in constraint-based test generation[A].Proceedings of the 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems[C].Berlin:Springer-Verlag,2008.351-366.
[11] Cadar C,Ganesh V,Pawlowski P M,et al.EXE:automatically generating inputs of death[A].Proceedings of the 13th ACM conference on Computer and communications security[C].New York:ACM,2006.322-335.
[12] Godefroid P,Levin M Y,Molnar D.Automated whitebox fuzz testing[A].Proceedings of the 16th Annual Network and Distributed System Security Symposium[C].California:Internet Society,2008.
[13] Majumdar R,Sen K.Hybrid concolic testing[A].Proceedings of the 29th International Conference on Software Engineering[C].Washington DC:IEEE Computer Society,2007.416-426.
[14] Xie T,Tillmann N,Halleux J D,et al.Fitness-guided path exploration in dynamic symbolic execution[A].Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks[C].Lisbon:IEEE,2009.359-368.
[15] Gustafsson J,Betts A,Ermedahl A,et al.The mälardalen WCET benchmarks:Past,present and future[A].Proceedings of the 10th International Workshop on Worst-Case Execution Time Analysis[C].Dagstuhl:Schloss Dagstuhl——Leibniz-Zentrum fuer Informatik,2010.136-146.
[16] Holsti N,Gustafsson J,Bernat G,et al.WCET 2008-Report from the Tool Challenge 2008-8th Intl.workshop on worst-case execution time (WCET) analysis[A].Proceedings of the 8th International Workshop on Worst-Case Execution Time Analysis[C].Dagstuhl:Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik,2008.1-23
[17] Pozo R,Miller B.SciMark:A numerical benchmark for Java and C/C++[J/OL].http://math.nist.gov/scimark2/,2004-03-31.
[18] Kuitunen J,Drolshagen G,Mcdonnell J,et al.DEBIE-first standard in-situ debris monitoring instrument[A].Proceedings of the Third European Conference on Space Debris[C].Netherlands:ESA Publications Division,2001.185-190.
[19] Quinlan D.ROSE:Compiler support for object-oriented frameworks[J].Parallel Processing Letters,2000,10(0):215-226.
[20] Prantl A,Knoop J,Schordan M,et al.Constraint solving for high-level WCET analysis[R].Udine:Computing Research Repository,2009.77-89.
[21] Healy C,Sjodin M,Rustagi V,et al.Supporting timing analysis by automatic bounding of loopIterations[J].Real-Time Systems,2000,18(2):129-156.
[22] Gulwani S,Mehra K K,Chilimbi T,et al.Speed:Precise and efficient static estimation of program computational complexity[A].Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages[C].New York:ACM,2009.127-139.
[23] Gulwani S,Zuleger F.The reachability-bound problem[A].Proceedings of the 31st ACM SIGPLAN Conference on Programming Language Design and Implementation[C].New York:ACM,2010.292-304.
[24] Henzinger T A,Hottelier T,Kovács L.Valigator:A verification tool with bound and invariant generation[A].Proceedings of the 15th International Conference on Logic for Programming,Artificial Intelligence,and Reasoning[C].Berlin:Springer-Verlag,2008.333-342.
[25] Godefroid P.Compositional dynamic test generation[A].Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Aymposium on Principles of Programming Languages[C].New York:ACM,2007.47-54.
[26] Li Y,Su Z,Wang L,et al.Steering symbolic execution to less traveled paths[A].Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages and Applications[C].New York:ACM,2013.19-32.
[27] Godefroid P,Luchaup D.Automatic partial loop summarization in dynamic test generation[A].Proceedings of the 2011 International Symposium on Software Testing and Analysis[C].New York:ACM,2011.23-33.
[28] Saxena P,Poosankam P,Mccamant S,et al.Loop-extended symbolic execution on binary programs[A].Proceedings of the Eighteenth International Symposium on Software Testing and Analysis[C].New York:ACM,2009.225-236.
[29] Xie X,Liu Y,Le W,et al.S-looper:automatic summarization for multipath string loops[A].Proceedings of the 2015 International Symposium on Software Testing and Analysis[C].New York:ACM,2015.188-198. |