Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis 2022
DOI: 10.1145/3533767.3534384
|View full text |Cite
|
Sign up to set email alerts
|

Combining static analysis error traces with dynamic symbolic execution (experience paper)

Abstract: This paper reports on our experience implementing a technique for sifting through static analysis reports using dynamic symbolic execution. Our insight is that if a static analysis tool produces a partial trace through the program under analysis, annotated with conditions that the analyser believes are important for the bug to trigger, then a dynamic symbolic execution tool may be able to exploit the trace by (a) guiding the search heuristically so that paths that follow the trace most closely are prioritised … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 42 publications
(41 reference statements)
0
2
0
Order By: Relevance
“…The authors in [13] discuss combining the Clang Static Analyzer with the dynamic symblic analyzer KLEE to refine the analysis. They highlight that traces provided by Clang are not that useful, and that Clang struggles to find non-trivial true positive.…”
Section: Future Workmentioning
confidence: 99%
“…The authors in [13] discuss combining the Clang Static Analyzer with the dynamic symblic analyzer KLEE to refine the analysis. They highlight that traces provided by Clang are not that useful, and that Clang struggles to find non-trivial true positive.…”
Section: Future Workmentioning
confidence: 99%
“…In this paper, we report our experiences investigating the functionality of directed symbolic execution in vulnerability verification scenario and designing a new heuristic search strategy called Dynamic Critical Constraint Modification (DCCM) search which utilize critical constraint to modify other forward symbolic execution strategy to reach the target program point quickly. As Busse F [7] concludes in their research, while fault injection experiments show the promise of guiding search by static report traces, they also reveal that those traces are not that useful in guiding search, even the same as just giving the vulnerability location as auxiliary. As a result, vulnerability verification problem serves as a line reachability problem, that is, given only a target point and a vulnerability type, generating test cases that can reproduce the vulnerability at the program point.…”
Section: Introductionmentioning
confidence: 98%