Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may quickly run out of space. For instance, a memory access to a symbolic address may potentially reference the entire address space, leading to a combinatorial explosion of the possible resulting execution states. To cope with this issue, state-of-the-art executors either concretize symbolic addresses that span memory intervals larger than some threshold or rely on advanced capabilities of modern SMT solvers. Unfortunately, concretization may result in missing interesting execution states, e.g., where a bug arises, while offloading the entire problem to constraint solvers can lead to very large query times. In this article, we first contribute to systematizing knowledge about memory models for symbolic execution, discussing how four mainstream symbolic executors deal with symbolic addresses. We then introduce ourname, a new approach to symbolic memory that reduces the need for concretization: %, hence offering the opportunity for broader state explorations and more precise pointer reasoning. rather than mapping address instances to data as previous approaches do, our technique maps symbolic address expressions to data, maintaining the possible alternative states resulting from the memory referenced by a symbolic address in a compact, implicit form. Experiments on prominent programs show that ourname, which we implemented in both angr and klee, enables the exploration of states that are unreachable for memory models that perform concretization, and provides a performance level comparable to memory models relying on advanced solver theories.

Memory Models in Symbolic Execution: Key Ideas and New Thoughts / Borzacchiello, Luca; Coppa, Emilio; Cono D’Elia, Daniele; Demetrescu, Camil. - In: SOFTWARE TESTING, VERIFICATION & RELIABILITY. - ISSN 1099-1689. - 29:8(2019), pp. 1-35. [10.1002/stvr.1722]

Memory Models in Symbolic Execution: Key Ideas and New Thoughts

Emilio Coppa
;
2019

Abstract

Symbolic execution is a popular program analysis technique that allows seeking for bugs by reasoning over multiple alternative execution states at once. As the number of states to explore may grow exponentially, a symbolic executor may quickly run out of space. For instance, a memory access to a symbolic address may potentially reference the entire address space, leading to a combinatorial explosion of the possible resulting execution states. To cope with this issue, state-of-the-art executors either concretize symbolic addresses that span memory intervals larger than some threshold or rely on advanced capabilities of modern SMT solvers. Unfortunately, concretization may result in missing interesting execution states, e.g., where a bug arises, while offloading the entire problem to constraint solvers can lead to very large query times. In this article, we first contribute to systematizing knowledge about memory models for symbolic execution, discussing how four mainstream symbolic executors deal with symbolic addresses. We then introduce ourname, a new approach to symbolic memory that reduces the need for concretization: %, hence offering the opportunity for broader state explorations and more precise pointer reasoning. rather than mapping address instances to data as previous approaches do, our technique maps symbolic address expressions to data, maintaining the possible alternative states resulting from the memory referenced by a symbolic address in a compact, implicit form. Experiments on prominent programs show that ourname, which we implemented in both angr and klee, enables the exploration of states that are unreachable for memory models that perform concretization, and provides a performance level comparable to memory models relying on advanced solver theories.
2019
Symbolic Execution, Software Testing, Memory Models, Pointer Reasoning
Memory Models in Symbolic Execution: Key Ideas and New Thoughts / Borzacchiello, Luca; Coppa, Emilio; Cono D’Elia, Daniele; Demetrescu, Camil. - In: SOFTWARE TESTING, VERIFICATION & RELIABILITY. - ISSN 1099-1689. - 29:8(2019), pp. 1-35. [10.1002/stvr.1722]
File in questo prodotto:
File Dimensione Formato  
Borzacchiello_Memory_2019.pdf

Solo gestori archivio

Tipologia: Versione dell'editore
Licenza: Tutti i diritti riservati
Dimensione 1.57 MB
Formato Adobe PDF
1.57 MB Adobe PDF   Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11385/236301
Citazioni
  • Scopus 13
  • ???jsp.display-item.citation.isi??? 10
social impact