Skip to main content

Table 9 Performance of Vulnerability Filter

From: ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis

Programs Vuln. Identif. by LAID Vuln. Filter with one-level inter-procedural path constraint Vuln. Filter with whole program path constraint Performance Comparison
   Number of remaining IO2BO sites Filter ratio Time (s) Number of remaining IO2BO sites Filter ratio Time (s) Filter ratio Time (s)
gocr 23 10 56.5% 11.8 7 69.6% 23.3 13.1% 2X
jasper 84 51 39.3% 8.4 37 56% 25.3 16.7% 3X
cpio 17 13 23.5% 1.1 9 47.1% 1.7 23.6% 1.5X
libexif 19 8 57.9% 2.2 8 57.9% 9.8 0% 4.5X
jbig2dec 10 5 50.0% 1428 5 50% 1725.2 10% 1.2X
swftools 233 75 67.8% 1466 75 67.8% 18369.2 0% 12.5X
Average - - 49.2% - - 58% - 8.8% 4.1X