CodeWisdom 08月16日
活动预告 | CodeWisdom 软件智能化开发学术系列报告 第16期:基于路径覆盖的符号执行路径优先探索策略
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

本次报告将介绍一种名为Empc的新型路径优先探索策略,旨在解决符号执行中的路径爆炸问题。传统方法依赖启发式权重对大量路径进行排序,但泛化能力有限。Empc通过计算路径覆盖(覆盖所有代码块的最小路径子集),将搜索和调度限制在这一最小集合内,从而大幅缩小了路径搜索空间,显著提升了符号执行的性能。报告人佘东冬助理教授来自香港科技大学,其研究专注于安全与机器学习交叉领域,并已在该领域取得多项重要学术成就。

📊 **路径爆炸是符号执行的挑战**:符号执行作为一种关键的程序分析技术,用于正式推断程序行为和检测软件漏洞,但其固有的路径爆炸问题导致需要处理的路径数量呈指数级增长,限制了其效率。

💡 **Empc提出路径覆盖策略**:Empc是一种创新的路径优先探索技术,它不直接处理所有可能路径,而是计算一个“路径覆盖”,即能够覆盖所有代码块的最小路径子集。

🚀 **缩小搜索空间,提升性能**:通过仅在计算出的最小路径覆盖内进行搜索和调度,Empc有效地缩小了符号执行的搜索空间,从而显著提升了符号执行的性能和效率。

🎓 **报告人背景与研究方向**:报告人佘东冬助理教授来自香港科技大学,其研究领域广泛,尤其关注将数据驱动方法(如LLM、优化)应用于传统安全问题(如漏洞检测、软件测试、程序分析),并已获得多项学术界认可的奖项。

2025-08-09 19:43 上海

8月20日上午10:00,报告主题基于路径覆盖的符号执行路径优先探索策略,可腾讯会议线上参加

Novel Path Prioritization for Symbolic Execution 

via Path Cover

摘要


Symbolic execution is an essential program analysis technique to formally reason program behaviors and detect software vulnerabilities. Despite its effectiveness, symbolic execution has an inherent limitation: path explosion. Path explosion occurs when symbolic execution encounters an overwhelming number (exponential to the program size) of paths. Traditional approaches rank the vast number of paths with heuristic-based weights. However, they often fail to be generalized to diverse programs. In this talk, I will introduce our recent work, Empc (S&P’25), a novel path prioritization technique for symbolic execution. We compute a path cover, i.e., a minimal subset of paths that can cover all code blocks, then only search and schedule within the minimal path cover instead of the vast number of all possible paths. By reducing the path search space, Empc can significantly boost symbolic execution performance.   


报告人:佘东冬  助理教授,香港科技大学

Dongdong She is an assistant professor at the Hong Kong University of Science and Technology, CSE department. He obtained his PhD from the CS department at Columbia University. Before Columbia, He earned his M.S. from UC Riverside and B.S. from Huazhong University of Science and Technology. He is broadly interested in security and machine learning. He is particularly interested in applying data-driven approaches (e.g., LLM, optimization) to solve traditional security problems (e.g., vulnerability detection, software testing, program analysis). His work has won distinguished paper awards in Oakland, ISSTA, best paper runner-up award in CCS and CSAW applied research award finalist.



活动安排

时间:

2025年8月20日 上午10:00

地点:

复旦大学江湾校区交叉学科2号楼A2003


腾讯会议:

会议号:593-840-767

会议密码:585010

阅读原文

跳转微信打开

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

符号执行 路径爆炸 路径覆盖 程序分析 软件安全
相关文章