Awesome
Learch: a Learning-based Strategies for Path Exploration in Symbolic Execution
Learch is a learning-based state selection strategy for symbolic execution. It can achieve significantly more coverage and detects more security violations than existing manual heuristics. Learch is instantiated on KLEE. The directory klee
contains our modified KLEE code (from this commit) and learch
contains the Learch code. Learch is developed at SRI Lab, Department of Computer Science, ETH Zurich as part of the Machine Learning for Programming project. For more details, please refer to Learch CCS'21 paper.
Setup
We provide a docker file, which we recommend to start with. To set Learch up locally, one can follow the instructions in the docker file. To build and run:
$ docker build -t learch .
$ docker run -it learch
Usages
The following README files explains how to use Learch:
- Obtaining the benchmarks used in the paper:
learch/benchmarks/README.md
. - Training Learch:
learch/train/README.md
. - Using Learch to test new programs:
learch/eval/README.md
.
Citing Learch
@inproceedings{10.1145/3460120.3484813,
author = {He, Jingxuan and Sivanrupan, Gishor and Tsankov, Petar and Vechev, Martin},
title = {Learning to Explore Paths for Symbolic Execution},
year = {2021},
isbn = {9781450384544},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3460120.3484813},
doi = {10.1145/3460120.3484813},
booktitle = {Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security},
pages = {2526–2540},
numpages = {15},
keywords = {fuzzing, symbolic execution, machine learning, program testing},
location = {Virtual Event, Republic of Korea},
series = {CCS '21}
}
Authors
- Jingxuan He
- Gishor Sivanrupan
- Petar Tsankov
- Martin Vechev
License
The KLEE code uses KLEE Release License and the Leach code uses Apache License 2.0.