Clone-Hunter: Accelerated Bound Checks Elimination via Binary Code Clone Detection

被引:16
|
作者
Xue, Hongfa [1 ]
Venkataramani, Guru [1 ]
Lan, Tian [1 ]
机构
[1] George Washington Univ, Washington, DC 20052 USA
关键词
Memory safety; Array bound checks; Machine learning; Binary analysis;
D O I
10.1145/3211346.3211347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unsafe pointer usage and illegitimate memory accesses are prevalent bugs in software. To ensure memory safety, conditions for array bound checks are inserted into the code to detect out-of-bound memory accesses. Unfortunately, these bound checks contribute to high runtime overheads, and therefore, redundant array bound checks should be removed to improve application performance. In this paper, we propose Clone-Hunter, a practical and scalable framework for redundant bound check elimination in binary executables. Clone-Hunter first uses binary code clone detection, and then employs bound safety verification mechanism (using binary symbolic execution) to ensure sound removal of redundant bound checks. Our results show the Clone-Hunter can swiftly identify redundant bound checks about 90x faster than pure binary symbolic execution, while ensuring zero false positives.
引用
收藏
页码:11 / 19
页数:9
相关论文
共 50 条
  • [41] Program Slice based Vulnerable Code Clone Detection
    Song, Xiaonan
    Yu, Aimin
    Yu, Haibo
    Liu, Shirun
    Bai, Xin
    Cai, Lijun
    Meng, Dan
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 293 - 300
  • [42] Transferring Code-Clone Detection and Analysis to Practice
    Dang, Yingnong
    Zhang, Dongmei
    Ge, Song
    Huang, Ray
    Chu, Chengyun
    Xie, Tao
    2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE TRACK (ICSE-SEIP 2017), 2017, : 53 - 62
  • [43] CMCD: Count Matrix based Code Clone Detection
    Yuan, Yang
    Guo, Yao
    2011 18TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2011), 2011, : 250 - 257
  • [44] Code Clone Detection Model: A SWOT Analysis Perspective
    Mubarak-Ali, Al-Fahim
    Romli, Rahiwan Nazar
    Sjarif, Nilam Nur Amir
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7210 - 7213
  • [45] SHINOBI: A Tool for Automatic Code Clone Detection in the IDE
    Kawaguchi, Shinji
    Yamashina, Takanobu
    Uwano, Hidetake
    Fushida, Kyhohei
    Kamei, Yasutaka
    Nagura, Masataka
    Iida, Hajimu
    16TH WORKING CONFERENCE ON REVERSE ENGINEERING (WCRE 2009), 2009, : 313 - +
  • [46] Code Clone Detection with Hierarchical Attentive Graph Embedding
    Ji, Xiujuan
    Liu, Lei
    Zhu, Jingwen
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2021, 31 (06) : 837 - 861
  • [47] TECCD: A Tree Embedding Approach for Code Clone Detection
    Gao, Yi
    Wang, Zan
    Liu, Shuang
    Yang, Lin
    Sang, Wei
    Cai, Yuanfang
    2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), 2019, : 145 - 156
  • [48] On the use of clone detection for identifying crosscutting concern code
    Bruntink, M
    van Deursen, A
    van Engelen, R
    Tourwé, T
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2005, 31 (10) : 804 - 818
  • [49] Rearranging the Order of Program Statements for Code Clone Detection
    Sabi, Yusuke
    Higo, Yoshiki
    Kusumoto, Shinji
    2017 IEEE 11TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2017, : 15 - 21
  • [50] Clone detection in source code by frequent itemset techniques
    Wahler, V
    Seipel, D
    Von Gudenberg, JW
    Fischer, G
    FOURTH IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2004, : 128 - 135