Skip to main content

Table 10 Statistics of comparison experiment

From: ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis

Programs

CVE Numbers

ELAID

LAID

KINT

  

Result

Time1(sec) (Vuln.Identif.)

Time2(sec) (Vuln.Filter)

Result

Time1(sec) (Vuln.Identif.)

Time2(sec) (Vuln.Filter)

Result

Analysis time(s)

gocr

2005-1141

\(\checkmark \)

3

< 1

\(\checkmark \)

2.1

11.8

x

1082

jasper

2011-4517

\(\checkmark \)

5

33

\(\checkmark \)

2.9

8.4

x

768.8

cpio

2014-9112

\(\checkmark \)

2

1

\(\checkmark \)

1.1

1.1

x

18.5

libexif

2016-6328

\(\checkmark \)

2

1

\(\checkmark \)

< 1

2.2

x

6.3

jbig2dec

2016-9601

\(\checkmark \)

5

108

\(\checkmark \)

< 1

1428

x

190.3

swftools

2017-16868

\(\checkmark \)

19

363

\(\checkmark \)

11.4

1466

x

1752

linux kernel

2019-14283

\(\checkmark \)

7766

3210

x

6567

3353

x

5563

 

2018-13406

\(\checkmark \)

  

\(\checkmark \)

  

x

 
 

2017-8924

\(\checkmark \)

  

x

  

x

 
 

2016-9084

\(\checkmark \)

  

\(\checkmark \)

  

\(\checkmark \)

 
 

2016-3135

\(\checkmark \)

  

\(\checkmark \)

  

x

 
 

2014-9904

\(\checkmark \)

  

\(\checkmark \)

  

\(\checkmark \)

 
 

2012-6703

\(\checkmark \)

  

\(\checkmark \)

  

\(\checkmark \)

 
 

2012-0044

\(\checkmark \)

  

\(\checkmark \)

  

\(\checkmark \)

Â