Theory and Practice of String Solvers (Invited Talk Abstract)

被引:2
|
作者
Kiezun, Adam [1 ]
Guo, Philip J. [2 ]
Hooimeijer, Pieter [3 ]
Ernst, Michael D. [4 ]
Ganesh, Vijay [5 ]
机构
[1] Amazon Inc, Seattle, WA 98109 USA
[2] Univ Calif San Diego, La Jolla, CA 92093 USA
[3] Facebook Inc, Menlo Pk, CA USA
[4] Univ Washington, Seattle, WA 98195 USA
[5] Univ Waterloo, Waterloo, ON, Canada
基金
加拿大自然科学与工程研究理事会; 美国国家科学基金会;
关键词
String SMT solvers; string equations; string solver-based analysis;
D O I
10.1145/3293882.3338993
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper titled "Hampi: A Solver for String Constraints" was published in the proceedings of the International Symposium on Software Testing and Analysis (ISSTA) 2009, and has been selected to receive the ISSTA 2019 Impact Paper Award. The paper describes HAMPI, one of the first practical solver aimed at solving the satisfiability problem for a theory of string (word) equations, operations over strings, and predicates over regular expressions and context-free grammars. HAMPI has been used widely to solve many software engineering and security problems, and has inspired considerable research on string solving algorithms and their applications. In this talk, we review the state of research on the theory and practice of string solving algorithms, specifically highlighting key historical developments that have led to their widespread use. On the practical front, we discuss different kinds of algorithmic paradigms, such as word- and automata-based, that have been developed to solve string and regular expression constraints. We then focus on the many hardness results that theorists have proved for fragments of theories over strings. Finally, we conclude with open theoretical problems, practical algorithmic challenges, and future applications of string solvers.
引用
收藏
页码:6 / 7
页数:2
相关论文
共 50 条
  • [31] MODELING WITH COLLABORATING PDE SOLVERS - THEORY AND PRACTICE
    MU, M
    RICE, JR
    COMPUTING SYSTEMS IN ENGINEERING, 1995, 6 (02): : 87 - 95
  • [32] Invited Abstract
    Kastan, Michael
    CANCER RESEARCH, 2009, 69
  • [33] Wireless Attacks on Automotive Remote Keyless Entry Systems [Invited Keynote Talk Abstract]
    Oswald, David
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 43 - 44
  • [34] Topology control and mobility management in mobile ad hoc networks - (Invited talk abstract)
    Dai, Fei
    SNPD 2006: Seventh ACIS International Conference on Software Engineering Artificial Intelligence, Networking, and Parallel/Distributed Computing, Proceedings, 2006, : 226 - 226
  • [35] The Missing Diagonal: High Level Languages for Low Level Systems (Invited Talk Abstract)
    Singh, Satnam
    PROCEEDINGS OF THE 2025 ACM SIGPLAN INTERNATIONAL WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION, PEPM 2025, 2025, : 12 - 12
  • [36] Minicomplexity Some Motivation, Some History, and Some Structure (Invited Talk Extended Abstract)
    Kapoutsis, Christos A.
    THEORY AND PRACTICE OF COMPUTER SCIENCE, SOFSEM 2019, 2019, 11376 : 28 - 38
  • [37] VLSI Systems for Neurocomputing and Health Informatics GLSVLSI'2014 Invited - Keynote Talk Abstract
    Parhi, Keshab K.
    GLSVLSI'14: PROCEEDINGS OF THE 2014 GREAT LAKES SYMPOSIUM ON VLSI, 2014, : 1 - 2
  • [38] Theory of quantum key distribution:: The road ahead (Invited talk)
    Lutkenhaus, Norbert
    INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 120 - 120
  • [39] The theory and practice of anaesthesia - Historical abstract
    Nosworthy, MD
    PAEDIATRIC ANAESTHESIA, 1996, 6 (02): : 120 - 120
  • [40] JLT Talk: The Practice of Literary Theory
    Geulen, Eva
    Martus, Steffen
    Spoerhase, Carlos
    JOURNAL OF LITERARY THEORY, 2024, 18 (02) : 121 - 147