Clone-Hunter: Accelerated Bound Checks Elimination via Binary Code Clone Detection

被引:16
|
作者
Xue, Hongfa [1 ]
Venkataramani, Guru [1 ]
Lan, Tian [1 ]
机构
[1] George Washington Univ, Washington, DC 20052 USA
关键词
Memory safety; Array bound checks; Machine learning; Binary analysis;
D O I
10.1145/3211346.3211347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unsafe pointer usage and illegitimate memory accesses are prevalent bugs in software. To ensure memory safety, conditions for array bound checks are inserted into the code to detect out-of-bound memory accesses. Unfortunately, these bound checks contribute to high runtime overheads, and therefore, redundant array bound checks should be removed to improve application performance. In this paper, we propose Clone-Hunter, a practical and scalable framework for redundant bound check elimination in binary executables. Clone-Hunter first uses binary code clone detection, and then employs bound safety verification mechanism (using binary symbolic execution) to ensure sound removal of redundant bound checks. Our results show the Clone-Hunter can swiftly identify redundant bound checks about 90x faster than pure binary symbolic execution, while ensuring zero false positives.
引用
收藏
页码:11 / 19
页数:9
相关论文
共 50 条
  • [1] Prioritizing Code Clone Detection Results for Clone Management
    Venkatasubramanyam, Radhika D.
    Gupta, Shrinath
    Singh, Himanshu Kumar
    2013 7TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2013, : 30 - 36
  • [2] Binary Code Clone Detection across Architectures and Compiling Configurations
    Hu, Yikun
    Zhang, Yuanyuan
    Li, Juanru
    Gu, Dawu
    2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2017, : 88 - 98
  • [3] Clone Detection and Elimination for Haskell
    Brown, Christopher
    Thompson, Simon
    PEPM '10: PROCEEDINGS OF THE 2010 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION, 2010, : 111 - 120
  • [4] Refactoring Code Clone Detection
    Othman, Zhala Sarkawt
    Kaya, Mehmet
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [5] Code Clone Detection via Software Visualization Representation Learning
    Qiu, Shaojian
    Wang, Shaosheng
    Liang, Yujun
    Jiang, Wenchao
    Zhang, Fanlong
    Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2023, 2023-July : 268 - 273
  • [6] On Precision of Code Clone Detection Tools
    Farmahinifarahani, Farima
    Saini, Vaibhav
    Yang, Di
    Sajnani, Hitesh
    Lopes, Cristina V.
    2019 IEEE 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER), 2019, : 84 - 94
  • [7] Generalizability of Code Clone Detection on CodeBERT
    Sonnekalb, Tim
    Gruner, Bernd
    Brust, Clemens-Alexander
    Mäder, Patrick
    arXiv, 2022,
  • [8] A Systematic Review on Code Clone Detection
    Ul Ain, Qurat
    Butt, Wasi Haider
    Anwar, Muhammad Waseem
    Azam, Farooque
    Maqbool, Bilal
    IEEE ACCESS, 2019, 7 : 86121 - 86144
  • [9] Generalizability of Code Clone Detection on CodeBERT
    Sonnekalb, Tim
    Gruner, Bernd
    Brust, Clemens-Alexander
    Mäder, Patrick
    ACM International Conference Proceeding Series, 2022,
  • [10] Generalizability of Code Clone Detection on CodeBERT
    Sonnekalb, Tim
    Gruner, Bernd
    Brust, Clemens-Alexander
    Maeder, Patrick
    PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,