Improving Program Debloating with 1-DU Chain Minimality
- URL: http://arxiv.org/abs/2402.00276v1
- Date: Thu, 1 Feb 2024 02:00:32 GMT
- Title: Improving Program Debloating with 1-DU Chain Minimality
- Authors: Myeongsoo Kim, Santosh Pande, and Alessandro Orso
- Abstract summary: We present RLDebloatDU, an innovative debloating technique that employs 1-DU chain minimality within abstract syntax trees.
Our approach maintains essential program data dependencies, striking a balance between aggressive code reduction and the preservation of program semantics.
- Score: 47.73151075716047
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Modern software often struggles with bloat, leading to increased memory
consumption and security vulnerabilities from unused code. In response, various
program debloating techniques have been developed, typically utilizing test
cases that represent functionalities users want to retain. These methods range
from aggressive approaches, which prioritize maximal code reduction but may
overfit to test cases and potentially reintroduce past security issues, to
conservative strategies that aim to preserve all influenced code, often at the
expense of less effective bloat reduction and security improvement. In this
research, we present RLDebloatDU, an innovative debloating technique that
employs 1-DU chain minimality within abstract syntax trees. Our approach
maintains essential program data dependencies, striking a balance between
aggressive code reduction and the preservation of program semantics. We
evaluated RLDebloatDU on ten Linux kernel programs, comparing its performance
with two leading debloating techniques: Chisel, known for its aggressive
debloating approach, and Razor, recognized for its conservative strategy.
RLDebloatDU significantly lowers the incidence of Common Vulnerabilities and
Exposures (CVEs) and improves soundness compared to both, highlighting its
efficacy in reducing security issues without reintroducing resolved security
issues.
Related papers
- Efficient Symbolic Execution of Software under Fault Attacks [6.333695701603308]
Fault attacks leverage physically injected hardware faults to break the safety of a software program.
Existing methods for analyzing the impact of faults on software suffer from inaccurate fault modeling and inefficient analysis algorithms.
We propose a fault modeling technique that leverages program transformation to add symbolic variables to the program, to accurately model the fault-induced program behavior.
Second, we propose a redundancy pruning technique that leverages the weakest precondition and fault saturation to mitigate path explosion.
arXiv Detail & Related papers (2025-03-20T03:19:48Z) - One-Shot Safety Alignment for Large Language Models via Optimal Dualization [64.52223677468861]
This paper presents a perspective of dualization that reduces constrained alignment to an equivalent unconstrained alignment problem.
We do so by pre-optimizing a smooth and convex dual function that has a closed form.
Our strategy leads to two practical algorithms in model-based and preference-based settings.
arXiv Detail & Related papers (2024-05-29T22:12:52Z) - A Multiplicative Value Function for Safe and Efficient Reinforcement
Learning [131.96501469927733]
We propose a safe model-free RL algorithm with a novel multiplicative value function consisting of a safety critic and a reward critic.
The safety critic predicts the probability of constraint violation and discounts the reward critic that only estimates constraint-free returns.
We evaluate our method in four safety-focused environments, including classical RL benchmarks augmented with safety constraints and robot navigation tasks with images and raw Lidar scans as observations.
arXiv Detail & Related papers (2023-03-07T18:29:15Z) - Interpreting Primal-Dual Algorithms for Constrained Multiagent
Reinforcement Learning [4.67306371596399]
Most C-MARL algorithms use a primal-dual approach to enforce constraints through a penalty function added to the reward.
We show that the standard practice of using the constraint function as the penalty leads to a weak notion of safety.
We propose a constrained multiagent advantage actor critic (C-MAA2C) algorithm.
arXiv Detail & Related papers (2022-11-29T10:23:26Z) - Log Barriers for Safe Black-box Optimization with Application to Safe
Reinforcement Learning [72.97229770329214]
We introduce a general approach for seeking high dimensional non-linear optimization problems in which maintaining safety during learning is crucial.
Our approach called LBSGD is based on applying a logarithmic barrier approximation with a carefully chosen step size.
We demonstrate the effectiveness of our approach on minimizing violation in policy tasks in safe reinforcement learning.
arXiv Detail & Related papers (2022-07-21T11:14:47Z) - Stabilizing Off-Policy Deep Reinforcement Learning from Pixels [9.998078491879145]
Off-policy reinforcement learning from pixel observations is notoriously unstable.
We show that these instabilities arise from performing temporal-difference learning with a convolutional encoder and low-magnitude rewards.
We propose A-LIX, a method providing adaptive regularization to the encoder's gradients that explicitly prevents the occurrence of catastrophic self-overfitting.
arXiv Detail & Related papers (2022-07-03T08:52:40Z) - Revisiting and Advancing Fast Adversarial Training Through The Lens of
Bi-Level Optimization [60.72410937614299]
We propose a new tractable bi-level optimization problem, design and analyze a new set of algorithms termed Bi-level AT (FAST-BAT)
FAST-BAT is capable of defending sign-based projected descent (PGD) attacks without calling any gradient sign method and explicit robust regularization.
arXiv Detail & Related papers (2021-12-23T06:25:36Z) - Always Be Dreaming: A New Approach for Data-Free Class-Incremental
Learning [73.24988226158497]
We consider the high-impact problem of Data-Free Class-Incremental Learning (DFCIL)
We propose a novel incremental distillation strategy for DFCIL, contributing a modified cross-entropy training and importance-weighted feature distillation.
Our method results in up to a 25.1% increase in final task accuracy (absolute difference) compared to SOTA DFCIL methods for common class-incremental benchmarks.
arXiv Detail & Related papers (2021-06-17T17:56:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.