File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.contributor.advisor Moon, Hyungon -
dc.contributor.author Kwak, Yeongjun -
dc.date.accessioned 2026-03-26T22:13:45Z -
dc.date.available 2026-03-26T22:13:45Z -
dc.date.issued 2026-02 -
dc.description.abstract Automatically generated security patches have become increasingly prevalent as automated vulnerability repair techniques advance. However, accurately validating whether such patches preserve the original program functionality remains a challenging problem. Existing test-based evaluation approaches often lead to misclassification when test cases are absent or insufficient. In addition, prior functionality preservation checking methods typically exclude error-handling blocks from the scope of validation, assuming that they do not affect the original functionality. This assumption causes incorrect validation results when patches introduce flawed error-handling logic, a pattern frequently observed in automatically generated security patches.
To address these limitations, we propose ExtractCompare, a functionality validation method based on execution flow equivalence for non-crashing inputs. ExtractCompare constructs preconditions at the repair location for both the original and patched programs, and determines functional validity by checking the implication between them. We evaluate ExtractCompare on a total of 84 security patches from L-AVRBench and an in-house dataset. In this evaluation, ExtractCompare correctly classified 27 patches as invalid that were misclassified as valid by prior functionality preservation checking method. This result demonstrates that ExtractCompare improves the reliability of functionality validation by reducing false positives in the assessment of automatically generated security patches.
-
dc.description.degree Master -
dc.description Department of Computer Science and Engineering -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/90939 -
dc.identifier.uri http://unist.dcollection.net/common/orgView/200000965899 -
dc.language ENG -
dc.publisher Ulsan National Institute of Science and Technology -
dc.rights.embargoReleaseDate 9999-12-31 -
dc.rights.embargoReleaseTerms 9999-12-31 -
dc.subject lithium-ion batteries, dry electrode process, electrode microstructure, carbon-binder domain, high-energy-density cell design -
dc.title Functionality Validation of Automatically Generated Security Patches via Execution Flow Equivalence -
dc.type Thesis -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.