Path-Sensitive Data Flow Analysis Simplified

被引:0
|
作者
Winter, Kirsten [1 ]
Zhang, Chenyi [1 ]
Hayes, Ian J. [1 ]
Keynes, Nathan [2 ]
Cifuentes, Cristina [3 ]
Li, Lian [3 ]
机构
[1] Univ Queensland, Sch ITEE, Brisbane, Qld 4072, Australia
[2] Oracle Brisbane, Brisbane, Qld, Australia
[3] Oracle Labs, Brisbane, Qld, Australia
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Path-sensitive data flow analysis pairs classical data flow analysis with an analysis of feasibility of paths to improve precision. In this paper we propose a framework for path-sensitive backward data flow analysis that is enhanced with an abstraction of the predicate domain. The abstraction is based on a three-valued logic. It follows the strategy that path predicates are simplified if possible (without calling an external predicate solver) and every predicate that could not be reduced to a simple predicate is abstracted to the unknown value, for which the feasibility is undecided. The implementation of the framework scales well and delivers promising results.
引用
收藏
页码:415 / 430
页数:16
相关论文
共 50 条
  • [31] Deciding Type-Based Partial-Order Constraints for Path-Sensitive Analysis
    Sherman, Elena
    Garvin, Brady J.
    Dwyer, Matthew B.
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2015, 24 (03)
  • [32] Reorganizing and Optimizing Post-Inspection on Suspicious Bug Reports in Path-Sensitive Analysis
    Ma, Xutong
    Yan, Jiwei
    Yan, Jun
    Zhang, Jian
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2019), 2019, : 260 - 271
  • [33] Refining Buffer Overflow Detection via Demand-Driven Path-Sensitive Analysis
    Le, Wei
    Soffa, Mary Lou
    PASTE'07 PROCEEDINGS OF THE 2007 ACM SIGPLAN- SIGSOFT WORKSHOP ON PROGRAM ANALYSIS FOR SOFTWARE TOOLS & ENGINEERING, 2007, : 63 - 68
  • [34] Oblivious program execution and path-sensitive non-interference
    Planul, Jeremy
    Mitchell, John C.
    2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 66 - 80
  • [35] Link-time path-sensitive memory redundancy elimination
    Fernández, M
    Espasa, R
    10TH INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS, 2004, : 300 - 309
  • [36] Path-Sensitive Race Detection with Partial Order Reduced Symbolic Execution
    Ibing, Andreas
    SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2014, 2015, 8938 : 311 - 322
  • [37] SMOKE: Scalable Path-Sensitive Memory Leak Detection for Millions of Lines of Code
    Fan, Gang
    Wu, Rongxin
    Shi, Qingkai
    Xiao, Xiao
    Zhou, Jinguo
    Zhang, Charles
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), 2019, : 72 - 82
  • [38] Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
    Cheng, Xiao
    Zhan, Guanqin
    Wang, Haoyu
    Sui, Yulei
    PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 519 - 531
  • [39] SPATA: Effective OS Bug Detection with Summary-Based, Alias-Aware, and Path-Sensitive Typestate Analysis
    Li, Tuo
    Bai, Jia-Ju
    Sui, Yulei
    Hu, Shi-Min
    ACM Transactions on Computer Systems, 2024, 42 (3-4):
  • [40] Static Detection of Use-After-Free Vulnerability in Binaries via Constrained Path-Sensitive Value-Set Analysis
    Wu, Tianjun
    Yang, Yuexiang
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 140 - 140