Latest Papers: Symbolic Execution, Model Checking, Fuzzing

Alex Johnson
-
Latest Papers: Symbolic Execution, Model Checking, Fuzzing

Stay up-to-date with the latest advancements in computer science! This article provides a comprehensive overview of the most recent research papers in the fields of symbolic execution, model checking, and fuzzing. We've compiled a list of 15 cutting-edge papers, offering a glimpse into the future of software verification and security. This curated list, inspired by the DailyArXiv project, aims to provide researchers, developers, and enthusiasts with a convenient way to explore the newest findings and contribute to the ongoing dialogue in these critical areas.

Please check the Github page for a better reading experience and more papers.

Symbolic Execution: A Deep Dive into Program Analysis

Symbolic execution stands as a robust technique in the realm of software verification. It's a method where program inputs are represented by symbolic values rather than concrete data, enabling the exploration of multiple execution paths simultaneously. Think of it as a super-powered debugger that doesn't just run a program once, but analyzes it for all possible scenarios! This approach is invaluable for identifying potential bugs, vulnerabilities, and unexpected behavior in complex software systems. By using symbolic values, we can explore every possibility within the code, ensuring robust and reliable programs. This section highlights the latest research in symbolic execution, showcasing novel approaches, optimizations, and applications of this powerful technique.

The papers listed below delve into various aspects of symbolic execution, including techniques for improving efficiency, handling complex program features, and leveraging machine learning to enhance the analysis process. From compact symbolic execution methods to neuro-symbolic approaches, the research presented here demonstrates the ongoing evolution and expanding capabilities of symbolic execution. Each paper offers unique insights and contributions, pushing the boundaries of what's possible in automated software analysis.

Title Date Comment
Compact Symbolic Execution 2013-09-18
This ...

This is a full version of the paper accepted to ATVA 2013

Speculative Symbolic Execution 2015-03-19 14 pages, 15 figures
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution 2018-07-03
Relational Symbolic Execution 2019-08-05
Compact Symbolic Execution (technical report) 2012-01-31
Towards Symbolic Pointers Reasoning in Dynamic Symbolic Execution 2022-03-23
Symbolic Execution Game Semantics 2020-02-24 41 pages, 5 figures
Input Validation with Symbolic Execution 2021-04-06
Symbolic Execution for Randomized Programs 2022-09-19
47 pa...

47 pages, 9 figures, to appear at OOPSLA 2022

Symbolic Execution and Debugging Synchronization 2020-07-01
Sydr: Cutting Edge Dynamic Symbolic Execution 2021-04-16 9 pages
Constraint Solving with Deep Learning for Symbolic Execution 2020-03-19
TASE: Reducing latency of symbolic execution with transactional memory 2020-01-01 13 pages, 7 figures
Symbolic Execution for Verification 2011-03-11 15 pages
TracerX: Dynamic Symbolic Execution with Interpolation 2020-12-02

Model Checking: Ensuring System Correctness

Model checking is a powerful technique for formally verifying the correctness of systems, particularly those with complex interactions and critical safety requirements. At its core, model checking involves creating a mathematical model of a system and then systematically exploring all possible states and transitions to ensure that it meets specific requirements or properties. It's like having a meticulous quality control inspector that examines every nook and cranny of your system's design. This approach is widely used in various domains, from hardware and software development to protocol verification and artificial intelligence.

The latest research in model checking focuses on enhancing its scalability, expressiveness, and applicability to real-world problems. Techniques such as abstraction, symbolic representation, and parallel algorithms are being developed to tackle the complexity of modern systems. Furthermore, researchers are exploring the integration of machine learning and model checking, creating hybrid approaches that can leverage the strengths of both paradigms. This section provides an overview of recent advancements in model checking, highlighting novel algorithms, tools, and applications.

The selection of papers below covers a broad spectrum of topics within model checking, including neural model checking, approximate LTL model checking, and model checking of specific systems and languages. These papers represent the cutting edge of research in this field, showcasing the ongoing efforts to make model checking more efficient, versatile, and accessible to practitioners.

Title Date Comment
Neural Model Checking 2024-11-01
To ap...

To appear in NeurIPS 2024

Approximate LTL model checking 2019-02-19 13 pages, 7 figures
Model Checking of vGOAL 2024-06-26
21 pa...

21 pages, 2 figures, it is a draft version of a paper that plans to submit to JAAMAS

Some approximations in Model Checking and Testing 2013-04-19
Model Checking ATL* on vCGS 2019-03-12
Lifted Model Checking for Relational MDPs 2022-01-11
Causality-based Model Checking 2017-10-11
In Pr...

In Proceedings CREST 2017, arXiv:1710.02770

Efficient Black-Box Checking via Model Checking with Strengthened Specifications 2021-09-13 Accepted to RV'21
Model Checking Probabilistic Pushdown Automata 2017-01-11
On the model-checking-based IDS 2018-06-26
34 pa...

34 pages, 18 figures, 26 tables

SCTL: Towards Combining Model Checking and Proof Checking 2017-10-03
Model Checking Quantum Systems --- A Survey 2018-07-26
Model Checking for a Class of Weighted Automata 2005-09-17 24 pages
Model Checking of Boolean Process Models 2011-05-04
Model Checking Parse Trees 2013-08-23 21 + x pages

Fuzzing: Uncovering Software Vulnerabilities

Fuzzing, also known as fuzz testing, is a dynamic software testing technique that involves providing invalid, unexpected, or random data as inputs to a program. The goal? To identify potential vulnerabilities, bugs, and crashes that might not be discovered through traditional testing methods. Think of it as a mischievous tester deliberately trying to break the software to see how it reacts. This approach is particularly effective for finding security flaws and robustness issues in software systems. Fuzzing has become an indispensable tool for software developers and security professionals, helping to ensure the reliability and security of modern applications.

The latest research in fuzzing explores various techniques for improving its effectiveness and efficiency. This includes the use of machine learning to guide the fuzzing process, the development of specialized fuzzers for different types of software, and the integration of fuzzing into the software development lifecycle. Researchers are also investigating novel approaches for generating test inputs, prioritizing bug findings, and automating the triage process. This section provides a glimpse into the cutting-edge research in fuzzing, highlighting the latest trends and advancements in this critical area of software testing.

The following papers showcase the diverse and rapidly evolving landscape of fuzzing research. From prompt fuzzing for driver generation to large-scale empirical analysis of continuous fuzzing, these papers demonstrate the breadth and depth of the field. They offer valuable insights into the challenges and opportunities of fuzzing, paving the way for more robust and secure software systems.

Title Date Comment
Prompt Fuzzing for Fuzz Driver Generation 2024-05-30
To ap...

To appear in the ACM CCS 2024

G-Fuzz: A Directed Fuzzing Framework for gVisor 2024-09-23
This ...

This paper has published in IEEE Transactions on Dependable and Secure Computing (TDSC), https://ieeexplore.ieee.org/abstract/document/10049484/citations?tabFilter=papers#citations

Learn&Fuzz: Machine Learning for Input Fuzzing 2017-01-26
V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing 2019-01-07
Token-Level Fuzzing 2023-04-06
Large-Scale Empirical Analysis of Continuous Fuzzing: Insights from 1 Million Fuzzing Sessions 2025-10-21
R1-Fuzz: Specializing Language Models for Textual Fuzzing via Reinforcement Learning 2025-09-26
Deep Reinforcement Fuzzing 2018-01-16
Fuzz Smarter, Not Harder: Towards Greener Fuzzing with GreenAFL 2025-10-30
Sydr-Fuzz: Continuous Hybrid Fuzzing and Dynamic Analysis for Security Development Lifecycle 2023-03-24
A Review of Machine Learning Applications in Fuzzing 2019-10-11
VGF: Value-Guided Fuzzing -- Fuzzing Hardware as Hardware 2023-12-12
20 pa...

20 pages, 7 figures, 7 tables

HOPPER: Interpretative Fuzzing for Libraries 2023-09-08
To ap...

To appear in the ACM CCS 2023

A Survey of Protocol Fuzzing 2024-10-15
An Empirical Study of Fuzz Harness Degradation 2025-05-12 16 pages, 26 figures

Conclusion

This compilation of recent research papers provides a snapshot of the exciting advancements happening in symbolic execution, model checking, and fuzzing. These techniques are crucial for building reliable and secure software systems, and the ongoing research in these areas is paving the way for even more sophisticated and effective methods. By staying informed about the latest developments, researchers, developers, and security professionals can leverage these powerful tools to create high-quality software that meets the challenges of today's complex world. To delve deeper into software testing methodologies and best practices, consider exploring resources available on trusted platforms like OWASP (Open Web Application Security Project).

You may also like