scholarly journals Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations

Author(s):  
Maria Paquin

Benchmark programs are an integral part of program analysis research. Researchers use benchmark programs to evaluate existing techniques and test the feasibility of new approaches. The larger and more realistic the set of benchmarks, the more confident a researcher can be about the correctness and reproducibility of their results. However, obtaining an adequate set of benchmark programs has been a long-standing challenge in the program analysis community. In this thesis, we present the APT tool, a framework we designed and implemented to automate the generation of realistic benchmark programs suitable for program analysis evaluations. Our tool targets intra-procedural analyses that operate on an integer domain, specifically symbolic execution. The framework is composed of three main stages. In the first stage, the tool extracts potential benchmark programs from open-source repositories suitable for symbolic execution. In the second stage, the tool transforms the extracted programs into compilable, stand-alone benchmarks by removing external dependencies and nonlinear expressions. In the third stage, the benchmarks are verified and made available for the user. We have designed our transformation algorithms to remove program dependencies and nonlinear expressions while preserving their semantics-equivalence in the abstraction of symbolic analysis. That is, we want the information the analysis computes on the original program and its transformed version to be equivalent. Our work provides static analysis researchers with concise, compilable benchmark programs that are relevant to symbolic execution, allowing them to focus their efforts on advancing analysis techniques. Furthermore, our work benefits the software engineering community by enabling static analysis researchers to perform benchmarking with a large, realistic set of programs, thus strengthening the empirical evidence of the advancements in static program analysis.

2021 ◽  
Vol 5 (OOPSLA) ◽  
pp. 1-30
Author(s):  
Yannis Smaragdakis ◽  
Neville Grech ◽  
Sifis Lagouvardos ◽  
Konstantinos Triantafyllou ◽  
Ilias Tsatiris

We present a static analysis approach that combines concrete values and symbolic expressions. This symbolic value-flow (“symvalic”) analysis models program behavior with high precision, e.g., full path sensitivity. To achieve deep modeling of program semantics, the analysis relies on a symbiotic relationship between a traditional static analysis fixpoint computation and a symbolic solver: the solver does not merely receive a complex “path condition” to solve, but is instead invoked repeatedly (often tens or hundreds of thousands of times), in close cooperation with the flow computation of the analysis. The result of the symvalic analysis architecture is a static modeling of program behavior that is much more complete than symbolic execution, much more precise than conventional static analysis, and domain-agnostic: no special-purpose definition of anti-patterns is necessary in order to compute violations of safety conditions with high precision. We apply the analysis to the domain of Ethereum smart contracts. This domain represents a fundamental challenge for program analysis approaches: despite numerous publications, research work has not been effective at uncovering vulnerabilities of high real-world value. In systematic comparison of symvalic analysis with past tools, we find significantly increased completeness (shown as 83-96% statement coverage and more true error reports) combined with much higher precision, as measured by rate of true positive reports. In terms of real-world impact, since the beginning of 2021, the analysis has resulted in the discovery and disclosure of several critical vulnerabilities, over funds in the many millions of dollars. Six separate bug bounties totaling over $350K have been awarded for these disclosures.


2015 ◽  
Vol 5 (3) ◽  
pp. 185-200
Author(s):  
Robert Z. Birdwell

Critics have argued that Elizabeth Gaskell's first novel, Mary Barton (1848), is split by a conflict between the modes of realism and romance. But the conflict does not render the novel incoherent, because Gaskell surpasses both modes through a utopian narrative that breaks with the conflict of form and gives coherence to the whole novel. Gaskell not only depicts what Thomas Carlyle called the ‘Condition of England’ in her work but also develops, through three stages, the utopia that will redeem this condition. The first stage is romantic nostalgia, a backward glance at Eden from the countryside surrounding Manchester. The second stage occurs in Manchester, as Gaskell mixes romance with a realistic mode, tracing a utopian drive toward death. The third stage is the utopian break with romantic and realistic accounts of the Condition of England and with the inadequate preceding conceptions of utopia. This third stage transforms narrative modes and figures a new mode of production.


2019 ◽  
Author(s):  
Lucy Armstrong ◽  
Lorna Hogg ◽  
Pamela Charlotte Jacobsen

The first stage of this project aims to identify assessment measures which include items on voice-hearing by way of a systematic review. The second stage is the development of a brief framework of categories of positive experiences of voice hearing, using a triangulated approach, drawing on views from both professionals and people with lived experience. The third stage will involve using the framework to identify any positve aspects of voice-hearing included in the voice hearing assessments identified in stage 1.


2018 ◽  
Vol 34 (02) ◽  
pp. 227-229
Author(s):  
Yi-gao Hu ◽  
Wei Ding ◽  
Jun Tan ◽  
Xin Chen ◽  
Tao Luo ◽  
...  

AbstractThis article investigates an effective method with which to reconstruct the tragus and external auditory meatus for microtia reconstruction. The external ear was reconstructed using a delayed postauricular skin flap in patients with congenital microtia. After the first stage of delaying the postauricular skin flap and the second stage of otoplasty with ear framework fabricated from autogenous rib cartilage draping with the delayed skin flap, the third stage involved tragus and external auditory meatus canaloplasty. After designing the remnant auricle flap, the lower part was trimmed and the tragus was reconstructed. The upper part was trimmed into a thin skin flap, which was rotated and used to cover the hollowed wound posterosuperior to the tragus so as to mimic the external auditory meatus. If remnant wounds were present, skin grafting was conducted. In total, 121 patients with congenital microtia were treated from March 2010 to March 2016. The reconstructed tragus and external auditory meatus were well formed, and all wounds healed well. No severe complications such as flap necrosis occurred. Six months postoperatively, the morphology of the reconstructed tragus and external auditory meatus was good. Overall, the patients and their families were satisfied. The use of remnant auricle to reconstruct the tragus and external auditory meatus is an effective auricular reconstruction technique.


Author(s):  
Т.А. Богумил

В статье предлагается концепция жизни и творческого роста В.М. Шукшина сквозь призму тезаурусного и кластерного подходов. Объяснительными «персональными моделями» для интерпретации биографического текста писателя являются кластеры Мартина Идена, Гамлета и Степана Разина. Ранее биографы и литературоведы указывали на важность этих персон для Шукшина, но разрозненно. Впервые предпринята попытка свести указанные персональные модели воедино, в целостный сюжет становления писателя в пространстве культуры. На разных этапах эволюции автора доминирует одна из указанных моделей, последовательно сменяя друг друга, но не вытесняя, а «внахлест». Ранний этап творчества, ориентированный на стратегию Мартина Идена, является попыткой «вписаться» в наличный культурный мейнстрим. Выражено это в следовании поэтике соцреализма. Второй этап подспудно начинается с реабилитации отца Шукшина в 1956 года, когда актуализируется «гамлетовский комплекс», проявляющийся в чувстве вины перед отцом, через стратегию утаивания подлинного «я», мотивы чудаковатости. Третий этап связан с личностью реального исторического лица, Степана Разина, и выражается в открытом протесте против власти. Все важные для В.М. Шукшина поведенческие модели объединены мотивом одинокого противостояния враждебному социуму и имеют трагический финал, что обусловило ранний уход писателя и порождение мифов о насильственном характере его смерти. В.М. Шукшин одновременно был фигурой неординарной и типичной, что позволило его биографии стать «персональной моделью» для последующих авторов, выходцев из сельской глубинки. The article proposes the concept of life and creative growth of V.M. Shukshin through the prism of the thesaurus and cluster approach. The explanatory "personal models" for interpreting the biographical text of the writer are clusters of Martin Eden, Hamlet and Stepan Razin. Earlier, biographers and literary critics pointed out the importance of these people for Shukshin, but it was scattered. For the first time, an attempt was made to bring these personal models together into an integral plot of the formation of the writer in the space of culture. At different stages of the writer’s evolution, one of these models dominates, successively replacing each other, but not crowding out, but “overlapping”. The early stage of creativity, focused on Martin Eden’s strategy, is an attempt to “fit in” the current cultural mainstream. This is expressed in following the poetics of socialist realism. The second stage implicitly begins with the rehabilitation of Shukshin’s father in 1956, when the “Hamletian complex” is actualized. It is manifested in a sense of guilt towards his father, the strategy of concealing the true “I”, eccentricities. The third stage is connected with the personality of a real historical person, Stepan Razin, and is expressed in an open protest against the authorities. All important for V.M. Shukshin's behavioral models are united by the motive of a lonely confrontation with a hostile society and have a tragic ending, which led to the early departure of the writer and the generation of myths about the violent nature of his death. V.M. Shukshin was an extraordinary and typical figure at the same time. That allowed his biography to become a “personal model” for subsequent authors who came from the rural outback.


2020 ◽  
pp. 39-42
Author(s):  
D. V. Minukhin ◽  
O. I. Tsyvenko ◽  
A. Yu. Korolevska ◽  
L. G. Tarasenko ◽  
D. Yu. Melnyk ◽  
...  

Most authors considered pleural cavity drainage to be the main method of treatment of acute pleural empyema using minor surgery. Despite the simplicity of drainage of the pleural cavity, the number of complications after this surgical manipulation, according to the reports of some authors, varies from 3 to 8 %. The complications of pleural drainage in the patients with acute nonspecific pleural empyema have been studied and the technique of pleural drainage "blindly" has been introduced, which allows drainage to be located along the chest wall. At the first stage of the four−stage study, the complications of pleural drainage in 38 patients with acute nonspecific pleural empyema were analyzed, at the second stage a device for drainage of the pleural cavity "blindly" was developed to place drainage in parallel to the chest wall, at the third stage patients were tested; on IV −− drainage of the pleural cavity of 34 patients was performed according to the proposed method. The reason for the development of drainage complications in the pleural cavity of patients with acute pleural empyema was the inadequate location of drainage in the pleural cavity, drainage of the pleural cavity was carried out in general hospitals without the use of thoracoscopic equipment. Curved thoracoport with trocar for a blind drainage of the pleural cavity "blindly" was developed and introduced into clinical practice. This technique eliminates the involuntary location of the drainage in the pleural cavity, installing it along the chest wall, and is safe. Complications associated with drainage of the pleural cavity according to the developed method using a curved thoracoport with a trocar, inadequate location of drainage, were not observed in patients. Key words: acute pleural empyema, pleural cavity drainage, curved trocar.


2020 ◽  
Vol 2 (3) ◽  
pp. 301-320
Author(s):  
Muhamad Sidik Triadi ◽  
Irfan Sanusi ◽  
Lida Imelda Cholidah

ABSTRAK Penulisan ini bertujuan untuk mengetahui manajemen humas radio Rama FM Bandung dalam meningkatkan pemasang iklan dari mulai tahapan perencanaan, pengorganisasian, pelaksanaan sampai dengan pengawasan, metode penelitian ini menggunakan metode kualitatif untuk mengetahui karakteristik  dengan cara berinteraksi secara langsung dan mendalam mengenai sebuah program dan ringkasan yang digambarkan pada konteks di atas mendasari untuk menggali dan mendeskripsikan kegiatan-kegiatan yang dijalankan oleh radio Rama FM Bandung dalam meningkatkan pemasang iklan. Analisis penelitian ini menggunakan deskriptif kualittaif. Hasil penelitian menunjukan bahwa kegiatan manajemen humas radio Rama FM Bandung dalam meningkatkan pemasang iklan dimulai pada tahapan pertama yaitu perencanaan pembuatan proposal, inovasi program, pengemasan iklan dan penyampaian iklan. Tahapan kedua yaitu pengorganisasian dengan komunikasi, membentuk team, pertimbangan tugas, dan persetujuan dari pimpinan. Tahapan ketiga yaitu pelaksanaan sesuai tugas, presentasi, pelaksanaan tugas sesuai susunan, pelaksanaan kegiatan. Tahap keempat yaitu pengawasan koordinasi, kinerja team yang bertugas, program yang berlangsung, dan pengawasan proses sebagai bahan evaluasi. Kata Kunci : Manajemen Humas; Meningkatkan; Pemasang Iklan. ABSTRACT This writing aims to determine radio public relations management Rama FM Bandung in increasing advertisers from the stages of planning, organizing, implementation to supervision, this research method uses a case study method to determine the characteristics by interacting directly and deeply about a case and summary illustrated in the above context underlying to explore and describe the activities carried out by radio Rama FM Bandung in improving advertisers. The analysis of this study uses descriptive qualitative. The results showed that the radio public relations management activities of Rama FM Bandung in increasing advertisers began in the first stage, namely the planning of making proposals, program innovation, packaging of advertisements and delivery of advertisements. The second stage is organizing with communication, forming teams, considering assignments, and approval from the leadership. The third stage is the implementation of tasks, presentations, implementation of tasks according to the arrangement, implementation of activities. The fourth stage is monitoring coordination, the performance of the team in charge, the ongoing program, and monitoring the process as an evaluation material. Keywords : Management Public Relations; Improve; Advertiser.


2020 ◽  
Vol 2 (3) ◽  
pp. 281-300
Author(s):  
Hadi Nurdin ◽  
Dang Eif Saiful Amin ◽  
Dyah Rahmi Astuti

ABSTRAK Tulisan ini bertujuan untuk mengetahui implementasi  CSR PT. Pos Indonesia pada program bantuan sarana peribadatan mulai dari tahap perencanaan, pengorganisasian, pelaksanaan dan pengawasan. Metode penelitian ini menggunakan metode studi kasus untuk mengetahui karakteristik  dengan cara berinteraksi secara langsung dan mendalam mengenai sebuah kasus dan ringkasan yang digambarkan pada konteks di atas mendasari untuk menggali dan mendeskripsikan kegiatan-kegiatan divisi PKBL PT. Pos Indonesia. Analisis penelitian ini menggunakan deskriptif kualittaif. Hasil penelitian menunjukan bahwa Implementasi Kegiatan Responsibility CSR pada program bantuan sarana peribadatan, mulai dari tahap pertama yaitu perencanaan agenda proposal, peninjauan proposal, dan perencanaan anggaran. Tahap kedua yaitu tahap pengorganisasian dengan mengorganisasikan persiapan, mengorganisasikan koordinasi dan mengorganisasikan pengelolaan anggaran. Tahap ketiga yaitu tahap pelaksanaan melaksanan briefing, melaksanakan program dilapangan dan melaksankan penyaluran dan. Tahap terakhir yaitu pengawasan  mengawasi program, mengawasi dana yang telah disalurkan. Kata Kunci : CSR; Implementasi; Bantuan Sarana Peribadatan ABSTRACT This research aims to determine the implementation of CSR PT. Pos Indonesia in the assistance program for worship facilities starting from the planning, organizing, implementing and monitoring stages. This research method uses a case study method to find out the characteristics by interacting directly and deeply about a case and a summary illustrated in the above context is underlying to explore and describe the activities of the PKBL division of PT. Indonesian post. The analysis of this study uses descriptive qualitative. The results of the study show that the implementation of CSR Responsibility Activities in the worship facilities assistance program, starting from the first stage, namely planning the proposal agenda, reviewing proposals, and budget planning. The second stage is the organizing stage by organizing preparations, organizing coordination and organizing budget management. The third stage is the stage of carrying out the briefing, implementing the program in the field and implementing the distribution and. The last stage is supervision overseeing the program, overseeing the funds that have been channeled. Keywords : CSR; Implementation; Religious Facilities Assistance


2018 ◽  
Vol 7 (2) ◽  
pp. 245-247
Author(s):  
Alsu Raufovna Kamaleeva ◽  
Svetlana Yurevna Gruzkova

The following paper deals with the application of methodology of pedagogical situations cognitive modeling, which is considered by the authors as a process consisting of six consecutive and interconnected stages. The first stage is a formulation of the purpose and the corresponding tasks. The second stage provides collecting, systematization and analysis of a pedagogical situation with the subsequent allocation of the major factors influencing development of the situation and determination of interrelation between them, i.e. creation of a cognitive map. At the third stage a focused count is created as a result of accounting of the cause and effect chains reflecting the system of interaction between the educational process subjects and allowing to form a pedagogical theory on the basis of basic person study categories: consciousness, thinking, knowledge, understanding, etc. The fourth stage assumes combination of the cognitive map and the focused count in a uniform cognitive model of the studied pedagogical situation. The fifth stage is focused on a real pedagogical situation cognitive model adequacy check i.e. on its verification. The last sixth stage allows to define possible options of a pedagogical situation development by a cognitive model, to find ways and mechanisms of a situation impact.


2021 ◽  
Vol 5 (1) ◽  
pp. 28-39
Author(s):  
Minami Yoda ◽  
Shuji Sakuraba ◽  
Yuichi Sei ◽  
Yasuyuki Tahara ◽  
Akihiko Ohsuga

Internet of Things (IoT) for smart homes enhances convenience; however, it also introduces the risk of the leakage of private data. TOP10 IoT of OWASP 2018 shows that the first vulnerability is ”Weak, easy to predict, or embedded passwords.” This problem poses a risk because a user can not fix, change, or detect a password if it is embedded in firmware because only the developer of the firmware can control an update. In this study, we propose a lightweight method to detect the hardcoded username and password in IoT devices using a static analysis called Socket Search and String Search to protect from first vulnerability from 2018 OWASP TOP 10 for the IoT device. The hardcoded login information can be obtained by comparing the user input with strcmp or strncmp. Previous studies analyzed the symbols of strcmp or strncmp to detect the hardcoded login information. However, those studies required a lot of time because of the usage of complicated algorithms such as symbolic execution. To develop a lightweight algorithm, we focus on a network function, such as the socket symbol in firmware, because the IoT device is compromised when it is invaded by someone via the Internet. We propose two methods to detect the hardcoded login information: string search and socket search. In string search, the algorithm finds a function that uses the strcmp or strncmp symbol. In socket search, the algorithm finds a function that is referenced by the socket symbol. In this experiment, we measured the ability of our proposed method by searching six firmware in the real world that has a backdoor. We ran three methods: string search, socket search, and whole search to compare the two methods. As a result, all methods found login information from five of six firmware and one unexpected password. Our method reduces the analysis time. The whole search generally takes 38 mins to complete, but our methods finish the search in 4-6 min.


Sign in / Sign up

Export Citation Format

Share Document