2022
DOI: 10.1145/3498538
|View full text |Cite
|
Sign up to set email alerts
|

BiRD: Race Detection in Software Binaries under Relaxed Memory Models

Abstract: Instruction reordering and interleavings in program execution under relaxed memory semantics result in non-intuitive behaviors, making it difficult to provide assurances about program correctness. Studies have shown that up to 90% of the concurrency bugs reported by state-of-the-art static analyzers are false alarms. As a result, filtering false alarms and detecting real concurrency bugs is a challenging problem. Unsurprisingly, this problem has attracted the interest of the research community over the past fe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 92 publications
0
2
0
Order By: Relevance
“…Binary memory dependence analysis, which determines whether two machine instructions in an executable can access the same memory location, is critical for many security-sensitive tasks, including detecting vulnerabilities [18,37,86], analyzing malware [39,95], hardening binaries [4,29,45,92], and forensics [19,35,58,93]. The key challenge behind memory dependence analysis is that machine instructions often leverage indirect addressing or indirect controlflow transfer (i.e., involving dynamically computed targets) to access the memory.…”
Section: Introductionmentioning
confidence: 99%
“…Binary memory dependence analysis, which determines whether two machine instructions in an executable can access the same memory location, is critical for many security-sensitive tasks, including detecting vulnerabilities [18,37,86], analyzing malware [39,95], hardening binaries [4,29,45,92], and forensics [19,35,58,93]. The key challenge behind memory dependence analysis is that machine instructions often leverage indirect addressing or indirect controlflow transfer (i.e., involving dynamically computed targets) to access the memory.…”
Section: Introductionmentioning
confidence: 99%
“…Binary memory dependence analysis, which determines whether two machine instructions in an executable can access the same memory location, is critical for many security-sensitive tasks, including detecting vulnerabilities [18,36,86], analyzing malware [38,93], hardening binaries [4,29,44,90], and forensics [19,35,58,91].…”
Section: Introductionmentioning
confidence: 99%