Skip to main content

Table 9 Performance of Vulnerability Filter

From: ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis

Programs

Vuln. Identif. by LAID

Vuln. Filter with one-level inter-procedural path constraint

Vuln. Filter with whole program path constraint

Performance Comparison

  

Number of remaining IO2BO sites

Filter ratio

Time (s)

Number of remaining IO2BO sites

Filter ratio

Time (s)

Filter ratio

Time (s)

gocr

23

10

56.5%

11.8

7

69.6%

23.3

13.1%

2X

jasper

84

51

39.3%

8.4

37

56%

25.3

16.7%

3X

cpio

17

13

23.5%

1.1

9

47.1%

1.7

23.6%

1.5X

libexif

19

8

57.9%

2.2

8

57.9%

9.8

0%

4.5X

jbig2dec

10

5

50.0%

1428

5

50%

1725.2

10%

1.2X

swftools

233

75

67.8%

1466

75

67.8%

18369.2

0%

12.5X

Average

-

-

49.2%

-

-

58%

-

8.8%

4.1X