陈哲
开通时间:..
最后更新时间:..
点击次数:
所属单位:计算机科学与技术学院/人工智能学院/软件学院
发表刊物:ISSTA - Proc. ACM SIGSOFT Int. Symp. Softw. Test. Anal.
摘要:The unsafe language features of C, such as low-level control of memory, often lead to memory errors, which can result in silent data corruption, security vulnerabilities, and program crashes. Dynamic analysis tools, which have been widely used for detecting memory errors at runtime, usually perform instrumentation at the IR-level or binary-level. However, their underlying non-source-level instrumentation techniques have three inherent limitations: optimization sensitivity, platform dependence and DO-178C non-compliance. Due to optimization sensitivity, these tools are used to trade either performance for effectiveness by compiling the program at -O0 or effectiveness for performance by compiling the program at a higher optimization level, say, -O3. In this paper, we overcome these three limitations by proposing a new source-level instrumentation technique and implementing it in a new dynamic analysis tool, called Movec, in a pointer-based instrumentation framework. Validation against a set of 86 microbenchmarks (with ground truth) and a set of 10 MiBench benchmarks shows that Movec outperforms state-of-the-art tools, SoftBoundCETS, Google’s AddressSanitizer and Valgrind, in terms of both effectiveness and performance considered together. © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM.
是否译文:否
发表时间:2019-07-10
合写作者:Yan, Junqi,2017023,钱巨,Xue, Jingling
通讯作者:陈哲