Affiliation:
1. CQSE GmbH, Garching, Germany
2. 4Soft GmbH, Munich, Germany
3. Capgemini Deutschland GmbH, Munich, Germany
4. Carnegie Mellon University, Pittsburgh, PA, USA
5. University of Passau, Passau, Germany
Abstract
The advent of variability management and generator technology enables users to derive individual system variants from a configurable code base by selecting desired configuration options. This approach gives rise to the generation of possibly billions of variants, which, however, cannot be efficiently analyzed for bugs and other properties with classic analysis techniques. To address this issue, researchers and practitioners have developed sampling heuristics and, recently, variability-aware analysis techniques. While sampling reduces the analysis effort significantly, the information obtained is necessarily incomplete, and it is unknown whether state-of-the-art sampling techniques scale to billions of variants. Variability-aware analysis techniques process the configurable code base directly, exploiting similarities among individual variants with the goal of reducing analysis effort. However, while being promising, so far, variability-aware analysis techniques have been applied mostly only to small academic examples. To learn about the mutual strengths and weaknesses of variability-aware and sample-based static-analysis techniques, we compared the two by means of seven concrete control-flow and data-flow analyses, applied to five real-world subject systems: B
usybox
, O
pen
SSL, SQL
ite
, the x86 L
inux
kernel, and
u
C
libc
. In particular, we compare the efficiency (analysis execution time) of the static analyses and their effectiveness (potential bugs found). Overall, we found that variability-aware analysis outperforms most sample-based static-analysis techniques with respect to efficiency and effectiveness. For example, checking all variants of O
pen
SSL with a variability-aware static analysis is faster than checking even only two variants with an analysis that does not exploit similarities among variants.
Funder
DFG
Science of Security Lablet
NSF
U.S. Department of Defense through the Systems Engineering Research Center
Publisher
Association for Computing Machinery (ACM)
Cited by
45 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献