Title | Dynamic Symbolic Execution for Polymorphism |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Li, Lian, Lu, Yi, Xue, Jingling |
Conference Name | Proceedings of the 26th International Conference on Compiler Construction |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5233-8 |
Keywords | composability, Concolic testing, Metrics, object oriented security, object-oriented programs, pubcrawl, resilience, Resiliency |
Abstract | Symbolic execution is an important program analysis technique that provides auxiliary execution semantics to execute programs with symbolic rather than concrete values. There has been much recent interest in symbolic execution for automatic test case generation and security vulnerability detection, resulting in various tools being deployed in academia and industry. Nevertheless, (subtype or dynamic) polymorphism of object-oriented programs has been neglected: existing symbolic execution techniques can explore different targets of conditional branches but not different targets of method invocations. We address the problem of how this polymorphism can be expressed in a symbolic execution framework. We propose the notion of symbolic types, which make object types symbolic. With symbolic types,[ various targets of a method invocation can be explored systematically by mutating the type of the receiver object of the method during automatic test case generation. To the best of our knowledge, this is the first attempt to address polymorphism in symbolic execution. Mutation of method invocation targets is critical for effectively testing object-oriented programs, especially libraries. Our experimental results show that symbolic types are significantly more effective than existing symbolic execution techniques in achieving test coverage and finding bugs and security vulnerabilities in OpenJDK. |
URL | http://doi.acm.org/10.1145/3033019.3033029 |
DOI | 10.1145/3033019.3033029 |
Citation Key | li_dynamic_2017 |