TY - GEN
T1 - Algorithm selection for software verification based on adversarial LSTM
AU - Wang, Qiang
AU - Jiang, Jiawei
AU - Zhao, Yongxin
AU - Cao, Weipeng
AU - Wang, Chunjiang
AU - Li, Shengdong
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/5
Y1 - 2021/5
N2 - As a prevalent technique for checking the correctness of software, software verification has achieved a significant progress in the past decades, reaching a point where a large number of verification algorithms and tools are available and sophisticated enough to handle the large-scale industrial software. However, it remains a difficult task to select a suitable verification algorithm or tool for the software at hand, given the fact that the underlying algorithms are diverse and the performance tradeoffs are hard to accurately characterize. In this paper, we study the algorithm selection problem for software verification, and propose a novel algorithm selection model based on the Long Short Term Memory network (LSTM). Our solution employs word2vec to obtain the embedding representation of the code, avoiding constructing the software features manually. We also propose a novel approach to construct the adversarial code examples in order to solve the sparsity and data imbalance problem. The experimental evaluations on the latest available dataset show that our solution improves the prediction accuracy by about 7% compared with the state-of-the-art selection algorithm.
AB - As a prevalent technique for checking the correctness of software, software verification has achieved a significant progress in the past decades, reaching a point where a large number of verification algorithms and tools are available and sophisticated enough to handle the large-scale industrial software. However, it remains a difficult task to select a suitable verification algorithm or tool for the software at hand, given the fact that the underlying algorithms are diverse and the performance tradeoffs are hard to accurately characterize. In this paper, we study the algorithm selection problem for software verification, and propose a novel algorithm selection model based on the Long Short Term Memory network (LSTM). Our solution employs word2vec to obtain the embedding representation of the code, avoiding constructing the software features manually. We also propose a novel approach to construct the adversarial code examples in order to solve the sparsity and data imbalance problem. The experimental evaluations on the latest available dataset show that our solution improves the prediction accuracy by about 7% compared with the state-of-the-art selection algorithm.
KW - Algorithm Selection
KW - Machine Learning
KW - software verification
UR - https://www.scopus.com/pages/publications/85113745498
U2 - 10.1109/BigDataSecurityHPSCIDS52275.2021.00026
DO - 10.1109/BigDataSecurityHPSCIDS52275.2021.00026
M3 - 会议稿件
AN - SCOPUS:85113745498
T3 - Proceedings - 2021 7th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021
SP - 87
EP - 92
BT - Proceedings - 2021 7th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 7th IEEE International Conference on Big Data Security on Cloud, 7th IEEE International Conference on High Performance and Smart Computing, and 6th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021
Y2 - 15 May 2021 through 17 May 2021
ER -