Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper)

被引:6
作者
Busse, Frank [1 ]
Gharat, Pritam [1 ]
Cadar, Cristian [1 ]
Donaldson, Alastair F. [1 ]
机构
[1] Imperial Coll London, London, England
来源
PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022 | 2022年
基金
英国工程与自然科学研究理事会; 欧洲研究理事会;
关键词
Software testing; symbolic execution; static analysis; KLEE; Clang Static Analyzer; Infer;
D O I
10.1145/3533767.3534384
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper reports on our experience implementing a technique for sifting through static analysis reports using dynamic symbolic execution. Our insight is that if a static analysis tool produces a partial trace through the program under analysis, annotated with conditions that the analyser believes are important for the bug to trigger, then a dynamic symbolic execution tool may be able to exploit the trace by (a) guiding the search heuristically so that paths that follow the trace most closely are prioritised for exploration, and (b) pruning the search using the conditions associated with each step of the trace. This may allow the bug to be quickly confirmed using dynamic symbolic execution, if it turns out to be a true positive, yielding an input that triggers the bug. To experiment with this approach, we have implemented the idea in a tool chain that allows the popular open-source static analysis tools Clang Static Analyzer (CSA) and Infer to be combined with the popular open-source dynamic symbolic execution engine KLEE. Our findings highlight two interesting negative results. First, while fault injection experiments show the promise of our technique, they also reveal that the traces provided by static analysis tools are not that useful in guiding search. Second, we have systematically applied CSA and Infer to a large corpus of real-world applications that are suitable for analysis with KLEE, and find that the static analysers are rarely able to find non-trivial true positive bugs for this set of applications. We believe our case study can inform static analysis and dynamic symbolic execution tool developers as to where improvements may be necessary, and serve as a call to arms for researchers interested in combining symbolic execution and static analysis to identify more suitable benchmark suites for evaluation of research ideas.
引用
收藏
页码:568 / 579
页数:12
相关论文
共 49 条
[1]  
[Anonymous], 2022, Clang Static Analyzer
[2]  
[Anonymous], 2022, Fortify Static Code Analyzer
[3]  
[Anonymous], 2022, Finding inter-procedural bugs at scale with Infer static analyzer
[4]  
Babic D., 2011, P 2011 INT S SOFTW T, P12, DOI DOI 10.1145/2001420.2001423
[5]  
Beckert Bernhard, 2020, Lecture Notes in Computer Science., V12345, P287, DOI [10.1007/978-3-030-64354-6_12, DOI 10.1007/978-3-030-64354-6_12]
[6]  
Bohme M., 2014, ISSTA, P105
[7]  
Brown F, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P199
[8]  
Busse Frank, 2022, Zenodo, DOI 10.5281/ZENODO.6539575
[9]  
Cadar C, 2005, LECT NOTES COMPUT SC, V3639, P2
[10]  
Cadar C., 2008, P USENIX OSDI SAN DI