Title:
Execution Hijacking: Improving Dynamic Analysis by Flying off Course
Execution Hijacking: Improving Dynamic Analysis by Flying off Course
dc.contributor.author | Tsankov, Petar | |
dc.contributor.author | Jin, Wei | |
dc.contributor.author | Orso, Alessandro | |
dc.contributor.author | Sinha, Saurabh | |
dc.contributor.corporatename | Georgia Institute of Technology. College of Computing | |
dc.contributor.corporatename | Georgia Institute of Technology. Center for Experimental Research in Computer Systems | |
dc.contributor.corporatename | IBM Research | |
dc.date.accessioned | 2011-02-16T17:30:00Z | |
dc.date.available | 2011-02-16T17:30:00Z | |
dc.date.issued | 2010 | |
dc.description.abstract | Typically, dynamic-analysis techniques operate on a small subset of all possible program behaviors, which limits their effectiveness and the representativeness of the computed results. To address this issue, a new paradigm is emerging: execution hijacking—techniques that explore a larger set of program behaviors by forcing executions along specific paths. Although hijacked executions are infeasible for the given inputs, they can still produce feasible behaviors that could be observed under other inputs. In such cases, execution hijacking can improve the effectiveness of dynamic analysis without requiring the (expensive) generation of additional inputs. To evaluate the usefulness of execution hijacking, we defined, implemented, and evaluated several variants of it. Specifically, we performed empirical study where we assessed whether execution hijacking could improve the effectiveness of two common dynamic analyses: software testing and memory error detection. The results of the study show that execution hijacking, if suitably performed, can indeed help dynamic analysis techniques. | en_US |
dc.identifier.uri | http://hdl.handle.net/1853/36919 | |
dc.language.iso | en_US | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | CERCS ; GIT-CERCS-10-12 | en_US |
dc.subject | Dynamic analysis | en_US |
dc.subject | Execution hijacking | en_US |
dc.subject | Memory error detection | en_US |
dc.subject | Software testing | en_US |
dc.title | Execution Hijacking: Improving Dynamic Analysis by Flying off Course | en_US |
dc.type | Text | |
dc.type.genre | Technical Report | |
dspace.entity.type | Publication | |
local.contributor.author | Orso, Alessandro | |
local.contributor.corporatename | Center for Experimental Research in Computer Systems | |
local.relation.ispartofseries | CERCS Technical Report Series | |
relation.isAuthorOfPublication | d23047b9-62b9-40ea-a94a-2d6222c76191 | |
relation.isOrgUnitOfPublication | 1dd858c0-be27-47fd-873d-208407cf0794 | |
relation.isSeriesOfPublication | bc21f6b3-4b86-4b92-8b66-d65d59e12c54 |