C
Cristian Cadar
Researcher at Imperial College London
Publications - 76
Citations - 8696
Cristian Cadar is an academic researcher from Imperial College London. The author has contributed to research in topics: Symbolic execution & Concolic testing. The author has an hindex of 27, co-authored 63 publications receiving 7816 citations. Previous affiliations of Cristian Cadar include Microsoft & Massachusetts Institute of Technology.
Papers
More filters
Proceedings ArticleDOI
KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs
TL;DR: A new symbolic execution tool, KLEE, capable of automatically generating tests that achieve high coverage on a diverse set of complex and environmentally-intensive programs, and significantly beat the coverage of the developers' own hand-written test suite is presented.
Journal ArticleDOI
EXE: Automatically Generating Inputs of Death
TL;DR: This article presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code by solving the current path constraints to find concrete values using its own co-designed constraint solver, STP.
Proceedings ArticleDOI
EXE: automatically generating inputs of death
TL;DR: This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code instead of running code on manually or randomly constructed input, and solves the current path constraints to find concrete values using its own co-designed constraint solver, STP.
Journal ArticleDOI
Symbolic execution for software testing: three decades later
Cristian Cadar,Koushik Sen +1 more
TL;DR: The challenges---and great promise---of modern symbolic execution techniques, and the tools to help implement them.
Proceedings Article
Enhancing server availability and security through failure-oblivious computing
TL;DR: Failure-oblivious computing is presented, a new technique that enables servers to execute through memory errors without memory corruption and enables the servers to continue to operate successfully to service legitimate requests and satisfy the needs of their users even after attacks trigger their memory errors.