Clone-Hunter: Accelerated Bound Checks Elimination via Binary Code Clone Detection

被引:16
|
作者
Xue, Hongfa [1 ]
Venkataramani, Guru [1 ]
Lan, Tian [1 ]
机构
[1] George Washington Univ, Washington, DC 20052 USA
关键词
Memory safety; Array bound checks; Machine learning; Binary analysis;
D O I
10.1145/3211346.3211347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unsafe pointer usage and illegitimate memory accesses are prevalent bugs in software. To ensure memory safety, conditions for array bound checks are inserted into the code to detect out-of-bound memory accesses. Unfortunately, these bound checks contribute to high runtime overheads, and therefore, redundant array bound checks should be removed to improve application performance. In this paper, we propose Clone-Hunter, a practical and scalable framework for redundant bound check elimination in binary executables. Clone-Hunter first uses binary code clone detection, and then employs bound safety verification mechanism (using binary symbolic execution) to ensure sound removal of redundant bound checks. Our results show the Clone-Hunter can swiftly identify redundant bound checks about 90x faster than pure binary symbolic execution, while ensuring zero false positives.
引用
收藏
页码:11 / 19
页数:9
相关论文
共 50 条
  • [31] Code Clone Detection Using Decentralized Architecture and Code Reduction
    Patil, Ritesh V.
    Joshi, Shashank D.
    Shinde, Sachin V.
    Ajagekar, Digvijay A.
    Bankar, Shubham D.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [32] Review Sharing via Deep Semi-Supervised Code Clone Detection
    Guo, Chenkai
    Yang, Hui
    Huang, Dengrong
    Zhang, Jianwen
    Dong, Naipeng
    Xu, Jing
    Zhu, Jingwen
    IEEE ACCESS, 2020, 8 (24948-24965) : 24948 - 24965
  • [33] Gapped Code Clone Detection with Lightweight Source Code Analysis
    Murakami, Hiroaki
    Hotta, Keisuke
    Higo, Yoshiki
    Igaki, Hiroshi
    Kusumoto, Shinji
    2013 IEEE 21ST INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2013, : 93 - 102
  • [34] SourcererCC: Scaling Code Clone Detection to Big-Code
    Sajnani, Hitesh
    Saini, Vaibhav
    Svajlenko, Jeffrey
    Roy, Chanchal K.
    Lopes, Cristina V.
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 1157 - 1168
  • [35] Learn To Align: A Code Alignment Network For Code Clone Detection
    Zhang, Aiping
    Liu, Kui
    Fang, Liming
    Liu, Qianjun
    Yun, Xinyu
    Ji, Shouling
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2021), 2021, : 1 - 11
  • [36] Efficient transformer with code token learner for code clone detection
    Zhang, Aiping
    Fang, Liming
    Ge, Chunpeng
    Li, Piji
    Liu, Zhe
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 197
  • [37] Clone detection via structural abstraction
    William S. Evans
    Christopher W. Fraser
    Fei Ma
    Software Quality Journal, 2009, 17 : 309 - 330
  • [38] Clone detection via structural abstraction
    Evans, William S.
    Fraser, Christopher W.
    Ma, Fei
    SOFTWARE QUALITY JOURNAL, 2009, 17 (04) : 309 - 330
  • [39] Clone detection via structural abstraction
    Evans, William S.
    Fraser, Christopher W.
    Ma, Fei
    14TH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2007, : 150 - 159
  • [40] LLVM-Based Code Clone Detection Framework
    Avetisyan, Arutyun
    Kurmangaleev, Shamil
    Sargsyan, Sevak
    Arutunian, Mariam
    Belevantsev, Andrey
    TENTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES REVISED SELECTED PAPERS CSIT-2015, 2015, : 100 - 104