scispace - formally typeset
C

Cristian Cadar

Researcher at Imperial College London

Publications -  76
Citations -  8696

Cristian Cadar is an academic researcher from Imperial College London. The author has contributed to research in topics: Symbolic execution & Concolic testing. The author has an hindex of 27, co-authored 63 publications receiving 7816 citations. Previous affiliations of Cristian Cadar include Microsoft & Massachusetts Institute of Technology.

Papers
More filters
Proceedings ArticleDOI

KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs

TL;DR: A new symbolic execution tool, KLEE, capable of automatically generating tests that achieve high coverage on a diverse set of complex and environmentally-intensive programs, and significantly beat the coverage of the developers' own hand-written test suite is presented.
Journal ArticleDOI

EXE: Automatically Generating Inputs of Death

TL;DR: This article presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code by solving the current path constraints to find concrete values using its own co-designed constraint solver, STP.
Proceedings ArticleDOI

EXE: automatically generating inputs of death

TL;DR: This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code instead of running code on manually or randomly constructed input, and solves the current path constraints to find concrete values using its own co-designed constraint solver, STP.
Journal ArticleDOI

Symbolic execution for software testing: three decades later

TL;DR: The challenges---and great promise---of modern symbolic execution techniques, and the tools to help implement them.
Proceedings Article

Enhancing server availability and security through failure-oblivious computing

TL;DR: Failure-oblivious computing is presented, a new technique that enables servers to execute through memory errors without memory corruption and enables the servers to continue to operate successfully to service legitimate requests and satisfy the needs of their users even after attacks trigger their memory errors.