Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Ying-Shen | en_US |
dc.contributor.author | Chen, Wei-Ning | en_US |
dc.contributor.author | Wu, Che-Yu | en_US |
dc.contributor.author | Hsiao, Hsu-Chun | en_US |
dc.contributor.author | Huang, Shih-Kun | en_US |
dc.date.accessioned | 2019-05-02T00:26:48Z | - |
dc.date.available | 2019-05-02T00:26:48Z | - |
dc.date.issued | 2018-01-01 | en_US |
dc.identifier.isbn | 978-1-5386-5790-4 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/151736 | - |
dc.description.abstract | To alleviate path explosion in symbolic execution, path pruning removes unsatisfiable paths at an early stage before they multiply. Although existing symbolic execution platforms have implemented several path pruning strategies to determine whether and when to check a path's satisfiability, it remains unclear how effective these strategies are because the time to check a path's satisfiability is non-negligible and may vary drastically. This work proposes dynamic path pruning (DPP), a strategy that aims to minimize the overall exploration time by dynamically adjusting the path checking rate. DPP assigns a higher checking rate to paths that are more likely to be unsatisfiable, and the likelihood is estimated based on the observed program's characteristics, such as the observed percentage of satisfiable paths. DPP is implemented on top of an open source symbolic execution platform in only a few hundred lines. Our evaluation confirms that DPP consistently achieves near-optimal exploration time for a wide spectrum of programs, whereas existing static path pruning strategies suffer from unacceptable worstcase performance due to their program-independent behaviors. Compared with static strategies, DPP performs best in 84% (110 out of 131) of CGC binaries, and the exploration time is within 100-124% of the best static strategy in 95% of the tested handcrafted and coreutils binaries. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Dynamic Path Pruning in Symbolic Execution | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.journal | 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC) | en_US |
dc.citation.spage | 123 | en_US |
dc.citation.epage | 130 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000462054900014 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Conferences Paper |