[Review] Assisting Static Analysis with Large Language Models: A ChatGPT Experiment
The paper demonstrates the effectiveness of LLM in static analysis.
The most important thing of this paper is the task division and the workflow design. First we need to figure out what the LLM is good at, and assign such tasks to it. What’s more, we need to care about the design of the workflow, which could significantly affect the final result.
Background
Traditional static analysis tools have some shortages. Embedding LLM into the toolchain can help the analysis.
In this paper, Use Before Initialization (UBI) bugs are chosen as the example.
UBITect, which is a tool for UBI bugs, has some shortcomings in detecting, and may discord some cases. LLM can help determine whether these bugs are true bugs.
![[Review] Assisting Static Analysis with Large Language Models: A ChatGPT Experiment](/blog/images/42/cover.png)
![[Review] One Simple API Can Cause Hundreds of Bugs: An Analysis of Refcounting Bugs in All Modern Linux Kernels](/blog/images/38/cover.png)
![[Review] PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing](/blog/images/28/cover.png)
![[Review] DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation](/blog/images/27/cover.png)
![[Review] Examining Zero-Shot Vulnerability Repair with Large Language Models](/blog/images/24/cover.jpg)
![[Review] Automated Program Repair in the Era of Large Pre-trained Language Models](/blog/images/23/cover.jpg)
![[Review] Large Language Models are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models](/blog/images/21/cover.jpg)
![[Review] autofz: Automated Fuzzer Composition at Runtime](/blog/images/16/cover.jpg)
![[Review] How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices](/blog/images/13/cover.png)
![[Review] MINER: A Hybrid Data-Driven Approach for REST API Fuzzing](/blog/images/12/cover.png)
![[Review] Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths](/blog/images/41/cover.png)
![[Review] GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis](/blog/images/40/cover.png)
![[Review] MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation](/blog/images/39/cover.png)