A Constraint-Pattern Based Method for Reachability Determination

被引:10
|
作者
Wang, Yuexing [1 ,2 ,3 ]
Gu, Zuxing [1 ,2 ,3 ]
Cheng, Xi [1 ,2 ,3 ]
Zhou, Min [1 ,2 ,3 ]
Song, Xiaoyu [4 ]
Gu, Ming [1 ,2 ,3 ]
Sun, Jiaguang [1 ,2 ,3 ]
机构
[1] Minist Educ, Key Lab Informat Syst Secur, Beijing, Peoples R China
[2] Tsinghua Natl Lab Informat Sci & Technol TNList, Beijing, Peoples R China
[3] Tsinghua Univ, Sch Software, Beijing, Peoples R China
[4] Portland State Univ, Elect & Comp Engn, Portland, OR 97207 USA
来源
2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1 | 2017年
关键词
D O I
10.1109/COMPSAC.2017.12
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
When analyzing programs using static program analysis, we need to determine the reachability of each possible execution path of the programs. Many static analysis tools collect constraints of each path and use SMT solvers to determine the satisfiability of these constraints. The accumulated computing time can be long if we use SMT solvers too many times. In this paper, we propose a constraint-pattern based method for reachability determination to address the limitation of current approaches. We define some constraint-patterns. For each pattern, a carefully designed constraints solving algorithm is presented. Our method contains two steps. Firstly, we collect some information about the constraints in the program to be analyzed. Then we choose the most suitable algorithm for reachability determination based on the information. Secondly, we apply the algorithm in analysis process to speed up satisfiability checking of path constraints. We implement our method based on CPAchecker, a famous software verification tool. The experimental results on some well-known benchmarks show that, with a moderate accuracy, our method is more efficient in comparison with some state-of-the-art SMT solvers.
引用
收藏
页码:85 / 90
页数:6
相关论文
共 50 条
  • [31] Constraint-based sequential pattern mining: the pattern-growth methods
    Jian Pei
    Jiawei Han
    Wei Wang
    Journal of Intelligent Information Systems, 2007, 28 : 133 - 160
  • [32] A Determination Method of Product Design Parameters with Interval Constraint
    Li Zhi-gang
    Li ling-ling
    Zhou Jun-gang
    Liu Jing-Zheng
    ADVANCED DESIGN AND MANUFACTURE II, 2010, 419-420 : 245 - 248
  • [33] Constraint-based sequential pattern mining: the pattern-growth methods
    Pei, Jian
    Han, Jiawei
    Wang, Wei
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2007, 28 (02) : 133 - 160
  • [34] A Novel PSO-Based Pattern Synthesis Method for Conformal Array with Dynamic Range Ratio Constraint
    Wang, Xin
    Yu, Dingke
    Xi, Yuzhang
    Fang, Wenwei
    Liu, Mengyue
    Lan, Bing
    Li, Nayu
    Song, Chunyi
    Xu, Zhiwei
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [35] A Verification Method of Enterprise Network Reachability Based on Topology Path
    Li, Yazhuo
    Luo, Yang
    Wei, Zhao
    Xia, Chunhe
    Liang, Xiaoyan
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 624 - 629
  • [36] Difference Bound Constraint Abstraction for Timed Automata Reachability Checking
    Wang, Weifeng
    Jiao, Li
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, FORTE 2015, 2015, 9039 : 146 - 160
  • [37] Label and Distance-Constraint Reachability Queries in Uncertain Graphs
    Chen, Minghan
    Gu, Yu
    Bao, Yubin
    Yu, Ge
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2014, PT I, 2014, 8421 : 188 - 202
  • [38] Reachability search in timed Petri nets using constraint programming
    Dress, OB
    Yim, P
    Korbaa, O
    Ghedira, K
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 4923 - 4928
  • [39] An Array Pattern Synthesis Method with the Constraint of Weight Amplitude Dynamic Range
    He, Xuehui
    Liu, Ying
    Wu, Shunjun
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 4639 - 4643
  • [40] Improved Pattern Synthesis Method With Linearly Constraint Minimum Variance Criterion
    Liu Xiaojun
    Liu Congfeng
    Liao Guisheng
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2, 2010, : 63 - 66