KLEE-related publications:

Below you can find a list of papers that use or extend KLEE. Papers are listed in chronological order. If you would like to have your paper listed here, please send email to the klee-dev mailing list.
  1. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
    Cristian Cadar, Daniel Dunbar, Dawson Engler
    USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008)
    December 8-10, 2008, San Diego, CA, USA

  2. Server-side Verification of Client Behavior in Online Games
    Darrell Bethea, Robert Cochran, Michael Reiter
    Network and Distributed System Security Symposium (NDSS 2010)
    February 28 - March 3, San Diego, CA, USA

  3. KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment
    Raimondas Sasnauskas, Olaf Landsiedel, Muhammad Hamad Alizai, Carsten Weise, Stefan Kowalewski, Klaus Wehrle
    ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
    April 12-16, 2010, Stockholm, Sweden

  4. Execution Synthesis: A Technique for Automated Software Debugging
    Cristian Zamfir, George Candea
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2010)
    April 13-16, 2010, Paris, France

  5. Reverse Engineering of Binary Device Drivers with RevNIC
    Vitaly Chipounov, George Candea
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2010)
    April 13-16, 2010, Paris, France

  6. Testing Closed-Source Binary Device Drivers with DDT
    Volodymyr Kuznetsov, Vitaly Chipounov, George Candea
    USENIX Annual Technical Conference (USENIX ATC 2010)
    June 22-25, 2010, Boston, MA, USA

  7. Stable Deterministic Multithreading through Schedule Memoization
    Heming Cui, Jingyue Wu, Chia-che Tsai, Junfeng Yang
    USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010)
    October 4-6, 2010, Vancouver, BC, Canada

  8. AEG: Automatic Exploit Generation
    Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley
    Network and Distributed System Security Symposium (NDSS 2011)
    February 6-9, 2011, San Diego, CA, USA

  9. S2E: A Platform for In Vivo Multi-Path Analysis of Software Systems
    Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
    International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2011)
    March 5-11, 2011, Newport Beach, CA

  10. Parallel Symbolic Execution for Automated Real-World Software Testing
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2011)
    Stefan Bucur, Vlad Ureche, Cristian Zamfir, George Candea
    April 10-13, 2011, Salzburg, Austria

  11. Symbolic Crosschecking of Floating-Point and SIMD Code
    Peter Collingbourne, Cristian Cadar, Paul H. J. Kelly
    ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2011)
    April 10-13, 2011, Salzburg, Austria

  12. Practical, Low-Effort Equivalence Verification of Real Code
    David Ramos, Dawson Engler
    Computer Aided Verification (CAV 2011)
    July 16-20, 2011, Snowbird, UT, USA

  13. Scalable Symbolic Execution of Distributed Systems
    Raimondas Sasnauskas, Oscar Soria Dustmann, Benjamin Lucien Kaminski, Carsten Weise, Stefan Kowalewski, Klaus Wehrle
    IEEE International Conference on Distributed Computing Systems (ICDCS 2011)
    June 20-24, 2011, Minneapolis, MN, USA

  14. Efficient Deterministic Multithreading through Schedule Relaxation
    Heming Cui, Jingyue Wu, John Gallagher, Huayang Guo, Junfeng Yang
    ACM Symposium on Operating Systems Principles (SOSP 2011)
    23-26 October, 2011, Cascais, Portugal