期刊文献+

Defeating constraint based program analysis with temporal correlation function

Defeating constraint based program analysis with temporal correlation function
下载PDF
导出
摘要 Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlation function can be applied to resist against both static and dynamic function summary and eoncolie testing. What' s more, the temporal correlation function can produce different outputs even with same input. This feature can be used to damage the premise of function summary as well as prevent concolie testing process to run the new branch with new input. Experiment results show that this method can reduce efficiency and path coverage of concolic testing, while greatly in- creasing the difficulty of constraint based program analysis. Constraint based program analysis is widely used in program validation,program vulnerability analysis,etc.This paper proposes a temporal correlation function to protect programs from analysis.The temporal correlation function can be applied to resist against both static and dynamic function summary and concolic testing.What's more,the temporal correlation function can produce different outputs even with same input.This feature can be used to damage the premise of function summary as well as prevent concolic testing process to run the new branch with new input.Experiment results show that this method can reduce efficiency and path coverage of concolic testing,while greatly increasing the difficulty of constraint based program analysis.
出处 《High Technology Letters》 EI CAS 2013年第3期332-337,共6页 高技术通讯(英文版)
基金 Supported by the National Natural Science Foundation of China(No.61121061) National Key Technology R&D Program(No.2012BAH38B02,2012BAH06B00)
关键词 program analysis symbolic execution satisfiability problem constraint solving 时间相关 基础 验证程序 程序分析 基于约束 函数分析 相关函数 测试过程
  • 相关文献

参考文献15

  • 1Godefroid P, Levin MY, Molnar D, et al. Automated whitebox fuzz testing. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, USA, 2008. 151-166. 被引量:1
  • 2King J C. Symbolic execution and program testing. Commun. ACM, 1976, 19(7): 385-394. 被引量:1
  • 3Csallner C, Smaragdakis Y. Check" n" crash: combining static checking and testing. In: Proceedings of the 27th International Conference on Software Engineering, New York, USA, 2005. 422-431. 被引量:1
  • 4Zhang L, Madigan C F, Moskewicz M H, et al. Efficient conflict driven learning in a boolean satisfiahility solver. In: Proceedings of the 2001 IEEE! ACM International Conference on Computer-aided Design, Piscataway, USA, 2001. 279-285. 被引量:1
  • 5Boonstoppel P, Cadar C, Engler D. RW set: Attacking path explosion in constraint-based test generation. In: Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2008. 351-366. 被引量:1
  • 6Anand S, Godefroid P, Tillmann N. Demand-driven compositional symbolic execution. In: Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Berlin, Germany, 2008. 367 -381. 被引量:1
  • 7Moskewicz M W, Madigan C F, Zhao Y, et al. Chaff: engineering an efficient SAT solver. In: Proceedings of the 38th Annual Design Automation Conference, New York, USA, 2001. 530-535. 被引量:1
  • 8orensson N, Een N. An extensible SAT-solver. In: Proceedings of the 6th International Conference on Theory and Applications of Satisfiability Testing, Santa Margherita Ligure, Italy, 2003.502-518. 被引量:1
  • 9Ranise S, Tinelli C. Satisfiability modulo theories. Trends and Controversies-IEEE Intelligent Systems Magazine, 2006,21(6): 71-81. 被引量:1
  • 10Dutertre B, De Moura L. A fast linear-arithmetic solver for DPLL (T). In: Proceedings of Computer Aided Verification, 2006. 81-94. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部