Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2019, Volume 31, Issue 6, Pages 21–32
DOI: https://doi.org/10.15514/ISPRAS-2019-31(6)-2
(Mi tisp468)
 

A formal model for program defect detection using symbolic program execution

A. Y. Gerasimov, D. O. Kutz, A. A. Novikov

Ivannikov Institute for System Programming of the Russian Academy of Sciences
References:
Abstract: An automatic program defect detection is extremely important direction of current research and development in the field of program reliability and security assurance. There were performed research of different ways of application for combined analysis methods which mix static source code analysis and dynamic symbolic execution, fuzz testing and dynamic symbolic execution as part of previous period of two years for project 17-07-00702 of the Russian Foundation for Basic Research. This paper presents elaboration of previously presented methods in form of formal model of program symbolic execution applied for program defect detection and implementation of analyzer of memory buffer bounds violation based on this model. The common theorem for program defect detection based on model of symbolic program execution and violation of definitional domain for computation system operation is formulated and proved. A special case theorem for buffer bounds violation detection is formulated and proved basing on common theorem and shadow memory model. As a practical application for theoretical basis an implementation of the analysis tool prototype description provided. Experimental results are received on the set of command line utilities of Debian Linux distribution, which shows applicability of proposed theoretical basis for solving practical tasks in the field of program reliability and security assurance.
Keywords: hybrid program analysis, dynamic symbolic execution, program defect detection.
Funding agency Grant number
Russian Foundation for Basic Research 17-07-00702
The research was supported by RFBR, grant 17-07-00702
Document Type: Article
Language: Russian
Citation: A. Y. Gerasimov, D. O. Kutz, A. A. Novikov, “A formal model for program defect detection using symbolic program execution”, Proceedings of ISP RAS, 31:6 (2019), 21–32
Citation in format AMSBIB
\Bibitem{GerKutNov19}
\by A.~Y.~Gerasimov, D.~O.~Kutz, A.~A.~Novikov
\paper A formal model for program defect detection using symbolic program execution
\jour Proceedings of ISP RAS
\yr 2019
\vol 31
\issue 6
\pages 21--32
\mathnet{http://mi.mathnet.ru/tisp468}
\crossref{https://doi.org/10.15514/ISPRAS-2019-31(6)-2}
Linking options:
  • https://www.mathnet.ru/eng/tisp468
  • https://www.mathnet.ru/eng/tisp/v31/i6/p21
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:134
    Full-text PDF :61
    References:22
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024