Concolic execution is a powerful program analysis technique for systematically exploring execution paths. Compared to random-mutation-based fuzzing, concolic execution is especially good at exploring paths that are gu...
详细信息
ISBN:
(纸本)9781939133311
Concolic execution is a powerful program analysis technique for systematically exploring execution paths. Compared to random-mutation-based fuzzing, concolic execution is especially good at exploring paths that are guarded by complex and tight branch predicates. The drawback, however, is that concolic execution engines are much slower than native execution. While recent advances in concolic execution have significantly reduced its performance overhead, our analysis shows that state-of-the-art concolic executors overlook the overhead for managing symbolic expressions. Based on the observation that concolic execution can be modeled as a special form of dynamic data-flowanalysis, we propose to leverage existing highly-optimized data-flowanalysis frameworks to implement concolic executors. To validate this idea, we implemented a prototype SYMSAN based on the data-flow sanitizer of LLVM and evaluated it against the state-of-the-art concolic executors SymCC and SymQEMU with three sets of programs: nbench, the DARPA Cyber Grand Challenge dataset, and real-world applications from Google's Fuzzbench and binutils. The results showed that SYMSAN has a much lower overhead for managing symbolic expressions. The reduced overhead can also lead to faster concolic execution and improved code coverage.
A software vulnerability could be exploited without any visible symptoms. When no source code is available, although such silent program executions could cause very serious damage, the general problem of analyzing sil...
详细信息
ReScript is a strongly typed language that targets JavaScript, as an alternative to gradually typed languages, such as TypeScript. In this paper, we present a sound type system for data-flowanalysis for a subset of t...
详细信息
ReScript is a strongly typed language that targets JavaScript, as an alternative to gradually typed languages, such as TypeScript. In this paper, we present a sound type system for data-flowanalysis for a subset of t...
详细信息
A lot of service-based business processes have been developed with the rapid growth of cloud computing. Ensuring the dataflow correctness of business processes is very important, which needs capturing the dataflow f...
详细信息
ISBN:
(纸本)9781728134307
A lot of service-based business processes have been developed with the rapid growth of cloud computing. Ensuring the dataflow correctness of business processes is very important, which needs capturing the dataflow firstly. In this article, an XCFG(eXtended Control flow Graph) based approach is proposed for the data flow analysis of business processes defined in BPEL specification. With XCFG modeling BPEL process, the improved equations for reaching definitions are defined to take the new characters of XCFG into consideration. Then iterative algorithm is adopted to solve the equations so that the definitions that may reach each XCFG node are computed. Case study shows the effectiveness of the proposed approach.
data-flowanalysis is a general technique used to compute information of interest at different points of a program and is considered to be a cornerstone of static analysis. In this thesis, we consider interprocedural ...
详细信息
The Android operating system is frequently updated, with each version bringing a new set of APIs. New versions may involve API deprecation;Android apps using deprecated APIs need to be updated to ensure the apps’ com...
详细信息
Logic vulnerabilities are largely dependent on the expected functions of web applications. Their appearance depends on both application logic and related security policy which may change based on modifications in busi...
详细信息
Logic vulnerabilities are largely dependent on the expected functions of web applications. Their appearance depends on both application logic and related security policy which may change based on modifications in business requirements. Accordingly, there are no specific and common patterns for logic vulnerabilities moreover, a security policy is required for their detection. In this study, a vulnerability detection method is proposed to detect logic vulnerabilities via analysing the program source code. Security checks enforce some constraints in the application so that the application behaves according to the logic intended by the programmer. The main goal is to find the vulnerabilities caused by bypassing some security checks. In this method, known as annotation-based vulnerability detection approach (ANOVUL), control and dataflows are analysed to detect the application logic vulnerabilities. To analyse the flows of the program, access control and authenticity labelling are used. To evaluate ANOVUL, the authors have collected a data set. This comprises of PHP applications with reported logic vulnerabilities that have common vulnerabilities and exposures (CVE) identifiers. Based on the results, a 73% detection rate was achieved in the data set. The proposed method can detect logic vulnerabilities that are not detectable using conventional methods.
Compiler architects increasingly look to machine learning when building heuristics for compiler optimization. The promise of automatic heuristic design, freeing the compiler engineer from the complex interactions of p...
详细信息
In accordance with Green Building Evaluation Standard and Green Building Technology Guidance, this paper selects the evaluation contents related to design scheme, establishes the evaluation index system optimizing the...
详细信息
暂无评论