Optimal Refinement-based Array Constraint Solving for Symbolic Execution

被引:0
作者
Liu, Meixi [1 ,2 ]
Shuai, Ziqi [1 ,2 ]
Liu, Luyao [1 ]
Ma, Kelin [1 ]
Ma, Ke [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
[2] Natl Univ Def Technol, State Key Lab High Performance Comp, Changsha, Peoples R China
来源
2022 29TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC | 2022年
关键词
symbolic execution; constraint solving; array SMT theory; machine learning; BIT-VECTORS;
D O I
10.1109/APSEC57359.2022.00042
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Array constraint solving is widely adopted by the existing symbolic execution engines for encoding programs precisely. The counterexample-guided abstraction refinement (CEGAR) based method is state-of-the-art for array constraint solving. However, we observed that the CEGAR-based method may need many refinements to solve the array constraints produced by the symbolic executor, which decreases the performance of constraint solving. Based on the observation, we propose a machine learning-based method to improve the efficiency of the CEGAR-based array constraint solving. Our method adaptively turns on or off the CEGAR loop according to different solving problems. We have implemented our method on the symbolic executor KLEE and its underlying CEGAR-based constraint solver STP. We have conducted an extensive experiment on 55 real-world programs. On average, our method increases the number of explored paths by 21%. The results of the extensive experiments on real-world C programs show the effectiveness of our method.
引用
收藏
页码:299 / 308
页数:10
相关论文
共 50 条
[41]   FlawCheck: Detecting Smart Contract Vulnerabilities Based on Symbolic Execution [J].
Gou, Naixiang ;
Zhao, Xiangfu ;
Wang, Shiji ;
Zhang, Hanfeng ;
Yang, Jiahui .
SECURITY AND PRIVACY, 2025, 8 (02)
[42]   Smart Contract Vulnerability Detection Based on Symbolic Execution Technology [J].
Liu, Yiping ;
Xu, Jie ;
Cui, Baojiang .
CYBER SECURITY, CNCERT 2021, 2022, 1506 :193-207
[43]   Test Case Selection based on Path Condtions of Symbolic Execution [J].
Munakata, Kazuki ;
Fujiwara, Shoichiro ;
Tokumoto, Susumu ;
Uehara, Tadahiro .
2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 2012, :318-321
[44]   Similar Execution Path Generation Based on Backward Symbolic Analysis [J].
Guo, Xi ;
Wang, Jianyong .
MODERN TENDENCIES IN ENGINEERING SCIENCES, 2014, 533 :427-431
[45]   Patch-Related Vulnerability Detection Based on Symbolic Execution [J].
Qiang, Weizhong ;
Liao, Yuehua ;
Sun, Guozhong ;
Yang, Laurence T. ;
Zou, Deqing ;
Jin, Hai .
IEEE ACCESS, 2017, 5 :20777-20784
[46]   Trustworthy Scheduling based on Constraint Solving Scheme [J].
Zhang, Juyang ;
Chen, Yixiang .
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, :1305-1307
[47]   Configuration of Domotic Systems based on Constraint Solving [J].
Leitner, Gerhard ;
Stettinger, Martin .
26TH ACM INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2022, VOL B, 2022, :145-149
[48]   A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes [J].
Baradaran, Sara ;
Heidari, Mahdi ;
Kamali, Ali ;
Mouzarani, Maryam .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) :1277-1290
[49]   A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes [J].
Sara Baradaran ;
Mahdi Heidari ;
Ali Kamali ;
Maryam Mouzarani .
International Journal of Information Security, 2023, 22 :1277-1290
[50]   A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes [J].
Mouzarani, Maryam ;
Kamali, Ali ;
Baradaran, Sara ;
Heidari, Mahdi .
TESTS AND PROOFS (TAP 2022), 2022, 13361 :89-105