Algorithm selection for software verification based on adversarial LSTM

  • Qiang Wang
  • , Jiawei Jiang
  • , Yongxin Zhao*
  • , Weipeng Cao
  • , Chunjiang Wang
  • , Shengdong Li
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

As a prevalent technique for checking the correctness of software, software verification has achieved a significant progress in the past decades, reaching a point where a large number of verification algorithms and tools are available and sophisticated enough to handle the large-scale industrial software. However, it remains a difficult task to select a suitable verification algorithm or tool for the software at hand, given the fact that the underlying algorithms are diverse and the performance tradeoffs are hard to accurately characterize. In this paper, we study the algorithm selection problem for software verification, and propose a novel algorithm selection model based on the Long Short Term Memory network (LSTM). Our solution employs word2vec to obtain the embedding representation of the code, avoiding constructing the software features manually. We also propose a novel approach to construct the adversarial code examples in order to solve the sparsity and data imbalance problem. The experimental evaluations on the latest available dataset show that our solution improves the prediction accuracy by about 7% compared with the state-of-the-art selection algorithm.

Original languageEnglish
Title of host publicationProceedings - 2021 7th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages87-92
Number of pages6
ISBN (Electronic)9781665439275
DOIs
StatePublished - May 2021
Event7th IEEE International Conference on Big Data Security on Cloud, 7th IEEE International Conference on High Performance and Smart Computing, and 6th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021 - Virtual, New York, United States
Duration: 15 May 202117 May 2021

Publication series

NameProceedings - 2021 7th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021

Conference

Conference7th IEEE International Conference on Big Data Security on Cloud, 7th IEEE International Conference on High Performance and Smart Computing, and 6th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021
Country/TerritoryUnited States
CityVirtual, New York
Period15/05/2117/05/21

Keywords

  • Algorithm Selection
  • Machine Learning
  • software verification

Fingerprint

Dive into the research topics of 'Algorithm selection for software verification based on adversarial LSTM'. Together they form a unique fingerprint.

Cite this