Accelerating Data-Flow Analysis with Full-Partitioning

被引:0
作者
Zhang, Yuantong
Chen, Liwei [1 ]
Nie, Xiaofan
Zhang, Zhijie
Wei, Haolai
Shi, Gang
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021) | 2021年
基金
中国国家自然科学基金;
关键词
full partition; data-flow analysis; use-after-free detection;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00184
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data-flow analysis is a classical way to deal with program optimization and program analysis issues. However, the classical iterative data-flow analysis prone to low efficiency when applied to vulnerability detection, because more exhaustive information is required. Therefore, we propose the full-partitioned interprocedural data-flow analysis. In this way, all works to a program are carried out to procedures strictly. We also introduce the novel Pointee Objects Intermediate Representation object to replace the real pointees during interprocedural pointer analysis. It aims to solve the representation of pointee objects when interprocedural pointer analysis is full-partitioned. The interprocedural data-flow analysis is realized by using the function summary. We have observed a significant increase in efficiency and a good capability to support the use-after-free detection.
引用
收藏
页码:1345 / 1352
页数:8
相关论文
共 50 条
  • [1] Dynamic Data-Flow Analysis with Dacite: Evaluating an Integrated Data-Flow Visualization Approach
    Troost, Laura
    Neugebauer, Jonathan
    Kuchen, Herbert
    EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2024, 2028 : 251 - 270
  • [2] Data-flow bending: On the effectiveness of data-flow integrity
    Lu, Tingting
    Wang, Junfeng
    COMPUTERS & SECURITY, 2019, 84 : 365 - 375
  • [3] Data-flow analysis for MPI programs
    Strout, Michelle Mills
    Kreaseck, Barbara
    Hovland, Paul D.
    2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2006, : 175 - 184
  • [4] TRACTABLE DATA-FLOW ANALYSIS FOR DISTRIBUTED SYSTEMS
    CHEUNG, SC
    KRAMER, J
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1994, 20 (08) : 579 - 593
  • [5] DATA-FLOW ANALYSIS OF ARRAY AND SCALAR REFERENCES
    FEAUTRIER, P
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 1991, 20 (01) : 23 - 53
  • [6] May/must analysis and the DFAGen data-flow analysis generator
    Stone, Andrew
    Strout, Michelle
    Behere, Shweta
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (10) : 1440 - 1453
  • [7] REGION ANALYSIS - A PARALLEL ELIMINATION METHOD FOR DATA-FLOW ANALYSIS
    LEE, YF
    RYDER, BG
    FIUCZYNSKI, ME
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (11) : 913 - 926
  • [8] Data-flow analysis in superscalar computer architecture execution
    Zaharieva-Stoyanova, EI
    TELSIKS 2003: 6TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICE, VOLS 1 AND 2, PROCEEDINGS OF PAPERS, 2003, : 622 - 625
  • [9] A GENERALIZED THEORY OF BIT VECTOR DATA-FLOW ANALYSIS
    KHEDKER, UP
    DHAMDHERE, DM
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (05): : 1472 - 1511
  • [10] Comprehensive Path-sensitive Data-flow Analysis
    Thakur, Aditya
    Govindarajan, R.
    CGO 2008: SIXTH INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, PROCEEDINGS, 2008, : 55 - 63