Concrete Constraint Guided Symbolic Execution
Symbolic execution is a popular program analysis technique. It systematically explores all feasible paths of a program but its scalability is largely limited by the path explosion problem, which causes the number of paths proliferates at runtime. A key idea in existing methods to mitigate this probl...
Uloženo v:
| Vydáno v: | Proceedings / International Conference on Software Engineering s. 1496 - 1507 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
ACM
14.04.2024
|
| Témata: | |
| ISSN: | 1558-1225 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Symbolic execution is a popular program analysis technique. It systematically explores all feasible paths of a program but its scalability is largely limited by the path explosion problem, which causes the number of paths proliferates at runtime. A key idea in existing methods to mitigate this problem is to guide the selection of states for path exploration, which primarily relies on the features to represent program states. In this paper, we propose concrete constraint guided symbolic execution, which aims to cover more concrete branches and ultimately improve the overall code coverage during symbolic execution. Our key insight is based on the fact that symbolic execution strives to cover all symbolic branches while concrete branches are neglected, and directing symbolic execution toward uncovered concrete branches has a great potential to improve the overall code coverage. The experimental results demonstrate that our approach can improve the ability of KLEE to both increase code coverage and find more security violations on 10 open-source C programs. |
|---|---|
| AbstractList | Symbolic execution is a popular program analysis technique. It systematically explores all feasible paths of a program but its scalability is largely limited by the path explosion problem, which causes the number of paths proliferates at runtime. A key idea in existing methods to mitigate this problem is to guide the selection of states for path exploration, which primarily relies on the features to represent program states. In this paper, we propose concrete constraint guided symbolic execution, which aims to cover more concrete branches and ultimately improve the overall code coverage during symbolic execution. Our key insight is based on the fact that symbolic execution strives to cover all symbolic branches while concrete branches are neglected, and directing symbolic execution toward uncovered concrete branches has a great potential to improve the overall code coverage. The experimental results demonstrate that our approach can improve the ability of KLEE to both increase code coverage and find more security violations on 10 open-source C programs. |
| Author | Sun, Limin Li, Zhi Sun, Yue Lv, Shichao Yang, Guowei |
| Author_xml | – sequence: 1 givenname: Yue surname: Sun fullname: Sun, Yue email: sunyue0205@iie.ac.cn organization: Institute of Information Engineering, CAS; School of Cyber Security, UCAS,China – sequence: 2 givenname: Guowei surname: Yang fullname: Yang, Guowei email: guowei.yang@uq.edu.au organization: The University of Queensland,Australia – sequence: 3 givenname: Shichao surname: Lv fullname: Lv, Shichao email: lvshichao@iie.ac.cn organization: Institute of Information Engineering, CAS; School of Cyber Security, UCAS,China – sequence: 4 givenname: Zhi surname: Li fullname: Li, Zhi email: lizhi@iie.ac.cn organization: Institute of Information Engineering, CAS; School of Cyber Security, UCAS,China – sequence: 5 givenname: Limin surname: Sun fullname: Sun, Limin email: sunlimin@iie.ac.cn organization: Institute of Information Engineering, CAS; School of Cyber Security, UCAS,China |
| BookMark | eNotjsFKw0AQQFdRsNacvXjID6Tuzuzs7B4l1FYoeGg9l81mCgttIkkK9u8t6Om90-M9qruu70SpZ6MXxlh6RQpMGhfoMGj2N6oIHLzVmjUYtrdqZoh8ZQDoQRXjmBtNFomdxZmq6r5Lg0xSXmWchpi7qVydcyttub2cmv6YU7n8kXSect89qftDPI5S_HOuvt6Xu3pdbT5XH_XbpoqA4CsRAmChhDaKhQAtJHNgIt0Y11qJnBIFcuI9Wm0NC6PG4EjIe9dqnKuXv24Wkf33kE9xuOzN9duDCfgLih5DZQ |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK ESBDL RIE RIO |
| DOI | 10.1145/3597503.3639078 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore Open Access Journals IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9798400702174 |
| EISSN | 1558-1225 |
| EndPage | 1507 |
| ExternalDocumentID | 10548219 |
| Genre | orig-research |
| GroupedDBID | -~X .4S .DC 29O 5VS 6IE 6IF 6IH 6IK 6IL 6IM 6IN 8US AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS ARCSS AVWKF BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO EDO ESBDL FEDTE I-F IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a2328-ee5227e5c34ae4292d2c1f7550b16d4ea7cc5956e88340417e7303965e5886d03 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:33:26 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a2328-ee5227e5c34ae4292d2c1f7550b16d4ea7cc5956e88340417e7303965e5886d03 |
| OpenAccessLink | https://ieeexplore.ieee.org/document/10548219 |
| PageCount | 12 |
| ParticipantIDs | ieee_primary_10548219 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-April-14 |
| PublicationDateYYYYMMDD | 2024-04-14 |
| PublicationDate_xml | – month: 04 year: 2024 text: 2024-April-14 day: 14 |
| PublicationDecade | 2020 |
| PublicationTitle | Proceedings / International Conference on Software Engineering |
| PublicationTitleAbbrev | ICSE |
| PublicationYear | 2024 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssib054357643 ssib055306466 ssj0006499 |
| Score | 2.2706523 |
| Snippet | Symbolic execution is a popular program analysis technique. It systematically explores all feasible paths of a program but its scalability is largely limited... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1496 |
| SubjectTerms | Codes Data Dependency Analysis Data mining Explosions Runtime Scalability Security Symbolic Execution |
| Title | Concrete Constraint Guided Symbolic Execution |
| URI | https://ieeexplore.ieee.org/document/10548219 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwFLSgYmAqH0V8ywOrixM_f2RGLUxVJUDqVjn2q9SBFpUUwb_n2U2BhYEtijLEiV_uXuy7Y-zGzGoTiyoK9NTpAHgval-CKFHZEAjUpaxz2IQdjdxkUo1bsXrWwiBi3nyG_XSY1_LjMqzTrzKqcOLXZTL53LXWbMRa28mjCfftL2-pFIdjIHGV9rNsiNu33j4F6FtFTFpL1VcE0TKFrP0KV8nYMuz-864OWO9HpcfH3_hzyHZwccS625gG3lbtMRN0PXHDBnlK58yZEA2_X88jRv74-VInZ2A--MCQ52CPPQ8HT3cPok1JEJ7YkBOIRKEs6qDAYwqfimUoZpY6j7owEdDTM9fUBaFzCiQUFqmoVWU0audMlOqEdRbLBZ4yDg6UUrpOclVw6Am9wswrMNFWVZTVGeul4U9fN0YY0-3Iz_84f8H2S-IAafGlgEvWaVZrvGJ74b2Zv62u8-v7AhW9lmE |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwFLRQQYKpfBTxTQbWFCd-dpwZtRRRqkoUqVvl2K9SB1pUEgT_nmc3hS4MbFGUIU78cvdi3x1jN2paKJfkLkZDnQ6AMXFhUohTFJm1BOqcFyFsIhsM9HicD2uxetDCIGLYfIZtfxjW8t3CVv5XGVU48evUm3xuS4CUr-Ra6-kjCfmzDXcpH4ijwLOV-sOsiN3X7j4JyFtBXFpy0RYE0tzHrG3EqwR06Tb_eV_7rPWr04uGPwh0wLZwfsia66CGqK7bIxbT9cQOS4x8PmdIhSij-2rm0EXPX6-F9waOOp9owyxssZduZ3TXi-uchNgQH9IxIpGoDKUVYNDHT7nUJtOMeo8iUQ7Q0FOX1Aeh1gI4JBlSWYtcSZRaK8fFMWvMF3M8YRFoEELIwgtWQaMh_LJTI0C5LM8dz09Zyw9_8raywpisR372x_lrttsbPfUn_YfB4znbS4kR-KWYBC5Yo1xWeMl27Ec5e19ehVf5DSAamag |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%2F+International+Conference+on+Software+Engineering&rft.atitle=Concrete+Constraint+Guided+Symbolic+Execution&rft.au=Sun%2C+Yue&rft.au=Yang%2C+Guowei&rft.au=Lv%2C+Shichao&rft.au=Li%2C+Zhi&rft.date=2024-04-14&rft.pub=ACM&rft.eissn=1558-1225&rft.spage=1496&rft.epage=1507&rft_id=info:doi/10.1145%2F3597503.3639078&rft.externalDocID=10548219 |