Accelerating Data-Flow Analysis with Full-Partitioning

被引:0
作者
Zhang, Yuantong
Chen, Liwei [1 ]
Nie, Xiaofan
Zhang, Zhijie
Wei, Haolai
Shi, Gang
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021) | 2021年
基金
中国国家自然科学基金;
关键词
full partition; data-flow analysis; use-after-free detection;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00184
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data-flow analysis is a classical way to deal with program optimization and program analysis issues. However, the classical iterative data-flow analysis prone to low efficiency when applied to vulnerability detection, because more exhaustive information is required. Therefore, we propose the full-partitioned interprocedural data-flow analysis. In this way, all works to a program are carried out to procedures strictly. We also introduce the novel Pointee Objects Intermediate Representation object to replace the real pointees during interprocedural pointer analysis. It aims to solve the representation of pointee objects when interprocedural pointer analysis is full-partitioned. The interprocedural data-flow analysis is realized by using the function summary. We have observed a significant increase in efficiency and a good capability to support the use-after-free detection.
引用
收藏
页码:1345 / 1352
页数:8
相关论文
共 50 条
  • [42] DATA FLOW ANALYSIS FOR PROCEDURAL LANGUAGES
    ROSEN, BK
    JOURNAL OF THE ACM, 1979, 26 (02) : 322 - 344
  • [43] On Probabilistic Techniques for Data Flow Analysis
    Di Pierro, Alessandra
    Hankin, Chris
    Wiklicky, Herbert
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 190 (03) : 59 - 77
  • [44] A Method of Secure Information Flow Based on Data Flow Analysis
    Yao, Jianbo
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 597 - 606
  • [45] Data Flow Analysis for Sequential Storage Structures
    Wang S.-D.
    Yin W.-J.
    Dong Y.-K.
    Zhang L.
    Liu H.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1276 - 1293
  • [46] Detection of information leak by data flow analysis
    Doh, KG
    Shin, SC
    ACM SIGPLAN NOTICES, 2002, 37 (08) : 66 - 71
  • [47] Data flow analysis of system: Specifications in LOTOS
    vanderSchoot, H
    Ural, H
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 1997, 7 (01) : 43 - 68
  • [48] A New Perspective for Understanding Data Flow Analysis
    Lin, Hai
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1522 - 1524
  • [49] Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis
    Yin X.
    Lu B.
    Cai R.
    Zhu X.
    Yang Q.
    Liu S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (02): : 326 - 340
  • [50] Pipelining Bottom-up Data Flow Analysis
    Shi, Qingkai
    Zhang, Charles
    2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 835 - 847