Symbolic Object Code Analysis



Professorship/Faculty: Lehrstuhl für Praktische Informatik, insbesondere Softwaretechnik und Programmiersprachen 
Author(s): Mühlberg, Jan Tobias; Lüttgen, Gerald  
Publisher Information: Bamberg : opus
Year of publication: 2010
Pages / Size: 19 S. : graph. Darst.
Series ; Volume: Bamberger Beiträge zur Wirtschaftsinformatik und Angewandten Informatik  ; 85
Language(s): English
URN: urn:nbn:de:bvb:473-opus-2364
Document Type: Other
Abstract: 
Current software model checkers quickly reach their limit when being applied to verifying pointer safety properties in source code that includes function pointers and inlined assembly. This paper introduces an alternative technique for checking pointer safety violations, called Symbolic Object Code Analysis (SOCA), which is based on bounded symbolic execution, incorporates path-sensitive slicing, and employs the SMT solver Yices as its execution and verification engine. Extensive experimental results of a prototypic SOCA Verifier, using the Verisec suite and almost 10,000 Linux device driver functions as benchmarks, show that SOCA performs competitively to current source-code model checkers and that it also scales well when applied to real operating systems code and pointer safety issues. SOCA effectively explores semantic niches of software that current software verifiers do not reach.
SWD Keywords: Programmcode ; Zeiger |Informatik| ; Konsistenzprüfung ; Programmtest ; Online-Publikation
Keywords: bounded model checking , symbolic execution , program slicing , object code analysis , linux device drivers, bounded model checking, symbolic execution, program slicing, object code analysis, linux device drivers
DDC Classification: 004 Computer science 
RVK Classification: ST 233   
URI: https://fis.uni-bamberg.de/handle/uniba/194
Release Date: 19. April 2012

File SizeFormat  
Dokument_1.pdf653.2 kBAdobe PDFView/Open