Scaling symbolic execution using staged analysis

被引:4
|
作者
Siddiqui, Junaid Haroon [1 ]
Khurshid, Sarfraz [2 ]
机构
[1] DHA, LUMS Sch Sci & Engn, Lahore, Pakistan
[2] Univ Texas Austin, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
Software testing; Symbolic execution; Staged analysis;
D O I
10.1007/s11334-013-0196-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recent advances in constraint solving technology and raw computation power have led to a substantial increase in the effectiveness of techniques based on symbolic execution for systematic bug finding. However, scaling symbolic execution remains a challenging problem. We present a novel approach to increase the efficiency of symbolic execution for systematic testing of object-oriented programs. Our insight is that we can apply symbolic execution in stages, rather than the traditional approach of applying it all at once, to compute abstract symbolic inputs that can later be shared across different methods to test them systematically. For example, a class invariant can provide the basis of generating abstract symbolic tests that are then used to symbolically execute several methods that require their inputs to satisfy the invariant. We present an experimental evaluation to compare our approach against KLEE, a state-of-the-art implementation of symbolic execution. Results show that our approach enables significant savings in the cost of systematic testing using symbolic execution.
引用
收藏
页码:119 / 131
页数:13
相关论文
共 50 条
  • [1] Scaling Symbolic Execution using Ranged Analysis
    Siddiqui, Junaid Haroon
    Khurshid, Sarfraz
    [J]. ACM SIGPLAN NOTICES, 2012, 47 (10) : 523 - 535
  • [2] Parallel Property Checking with Staged Symbolic Execution
    Wen, Junye
    Yang, Guowei
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1802 - 1809
  • [3] Differential Fault Analysis Using Symbolic Execution
    van Woudenberg, Jasper
    Breunesse, Cees-Bart
    Velegalati, Rajesh
    Yalla, Panasayya
    Gonzalez, Sergio
    [J]. PROCEEDINGS OF THE 7TH SOFTWARE SECURITY, PROTECTION, AND REVERSE ENGINEERING WORKSHOP 2017 (SSPREW), 2017,
  • [4] Complexity vulnerability analysis using symbolic execution
    Luckow, Kasper
    Kersten, Rody
    Pasareanu, Corina
    [J]. SOFTWARE TESTING VERIFICATION & RELIABILITY, 2020, 30 (7-8):
  • [5] An analysis on secure coding using symbolic execution engine
    Kim, Joon-Ho
    Ma, Myung-Chul
    Park, Jae-Pyo
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (03): : 177 - 184
  • [6] Automated Analysis of Reo Circuits using Symbolic Execution
    Pourvatan, Bahman
    Sirjani, Marjan
    Hojjat, Hossein
    Arbab, Farhad
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 255 : 137 - 158
  • [7] Automatic flow analysis using symbolic execution and path enumeration
    Kebbal, D.
    [J]. 2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2006, : 397 - 404
  • [8] Finding ∀∃ Hyperbugs using Symbolic Execution
    Correnson, Arthur
    Niessen, Tobias
    Finkbeiner, Bernd
    Weissenbacher, Georg
    [J]. Proceedings of the ACM on Programming Languages, 2024, 8 (OOPSLA2)
  • [9] VERIFICATION OF PROTOCOLS USING SYMBOLIC EXECUTION
    BRAND, D
    JOYNER, WH
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1978, 2 (4-5): : 351 - 360
  • [10] Symbolic Execution for Memory Consumption Analysis
    Chu, Duc-Hiep
    Jaffar, Joxan
    Maghareh, Rasool
    [J]. ACM SIGPLAN NOTICES, 2016, 51 (05) : 62 - 71