期刊文献+

一种区间型程序不变量检测方法 被引量:2

Method for Interval-based Program Invariant Detection
在线阅读 下载PDF
导出
摘要 程序不变量的发现是提高软件质量的一种有效方法。静态分析是发现程序不变量的一个研究方向。本文以数学理论为基础,结合图形化方法,对区间型不变量给出一种简单有效的静态分析方法,阐述其检测过程,并用实例进行验证说明。 The detection of program invariants is an effective way to improve software quality. Static analysis is one research direction of discovering program invariants. This paper, based on the theory of mathematic and combined with graphical methods, gives a simple and effective static analysis method for the interval invafiant, describes its testing process, and validates this method with examples.
作者 陈才
出处 《计算机与现代化》 2010年第3期184-187,共4页 Computer and Modernization
关键词 程序不变量 静态分析 图形化方法 program invariants static analysis graphical methods
  • 相关文献

参考文献12

  • 1Ernst Michael D. Dynamically Discovering Likely Program lnvariants[ D ]. Ph.D. Dissertation : University of Washington Department of Computer Science and Engineering, Seattle, Washington, 2000.
  • 2Ernst Michael D, Cockrell Jake, Griswold William G, et al. Dynamically discovering likely program invariants to support program evolution [ J ]. IEEE Transactions on Software Engineering,2001,27(2) :99-123.
  • 3Cousot P, Cousot T. Abstract interpretation based program testing[ C]//Proceedings of the SSGRR 2000 Computer & Business Conference. L' Aquila, Italy,2000.
  • 4Cousot P, Cousot R. Basic concepts of abstract interpretation[ C]//Building the Information Society. Kluwer Academic Publishers,2004:359-366.
  • 5徐良华,孙玉龙,高丰,朱鲁华.基于逆向工程的软件漏洞挖掘技术[J].微计算机信息,2006,22(08X):259-261. 被引量:10
  • 6黄锦,陈晓苏,肖道举,刘辉宇.基于模型检验的软件安全静态分析研究[J].微计算机信息,2007,23(30):86-87. 被引量:5
  • 7李慧贤,刘坚.数据流分析方法[J].计算机工程与应用,2003,39(13):142-144. 被引量:13
  • 8郁卫江,朱根江,谢立.一个过程间数据流分析的框架[J].软件学报,1997,8(9):653-662. 被引量:2
  • 9刘磊,叶晓煜.过程间的数据流分析技术[J].计算机研究与发展,1997,34(4):303-306. 被引量:2
  • 10Denmat Tristan, Goflieb Arnaud. Proving or disproving likely invariants with constraint reasoning[ C]//Proceedings of the 15th Workshop on Logic-based Methods in Programming Environments ( WLPE' 05 ). 2005.

二级参考文献18

  • 1朱根江,谢立,孙钟秀.一种基于非正规域的区域依赖关系分析法[J].计算机学报,1994,17(3):168-175. 被引量:1
  • 2王前,余静,陈性元,谢寿生.安全隐患检测系统的设计与实现[J].微计算机信息,2005,21(10X):3-4. 被引量:5
  • 3徐良华,孙玉龙,高丰,朱鲁华.基于逆向工程的软件漏洞挖掘技术[J].微计算机信息,2006,22(08X):259-261. 被引量:10
  • 4Khedker U P,Dhamdhere D M.A generalized theory of bit vector data flow analysis[J].ACM TOPLAS, 1994:16(5 ) : 1472-511.
  • 5Hecht M S.Flow Analysis of Computer Programs.The Computer Science Library Programming Language Series.Elsevier North-Holland, 1977.
  • 6S Graham,M Wegman.A fast and usually linear algorithm for global data flow analysis[J]Journal of ACM, 1976;23( 1 ) : 172-202.
  • 7Rohmer R,Lescoeur R,Kersit J M.The Alexander methed,a technique for the processing of recursive axioms in deductive databases[J].New Generation Computing, 1986;4(3) :273-285.
  • 8Sharir M,Pnueli A.Two approaches to interprocedural data flow analysis[C].In:S S Muchnick,N D Jones eds.Program Flow Analysis:Theory and Applications,Prentice-Hall,Englewood Cliffs,NJ, 1981 : 189-233.
  • 9Kildall G.A unified approach to global program optimization[C].In:Conference Record of the First ACM Symposium on Principles of Programming Languages,ACM,New York ,NY, 1973 : 194-206.
  • 10Hu Shibin,ACM SIGPLAN Not,1988年,28卷,5期,3页

共引文献27

同被引文献23

  • 1刘树锟,阳小华.动态不变量检测工具Daikon的分析及运用[J].电脑开发与应用,2006,19(1):6-8. 被引量:2
  • 2Antonia Bertolino. Software testing research: achievements, chal- lenges, dreams[ C]. Future of Software Engineering ( FOSE '07), Minneapolis, USA, May,2007:96-114.
  • 3Alex Groce, Gerard Holzmann, Rajecv Joshi. Randomized differ- ential testing as a prelude to formal verification[C]. 29th Interna- tional Conference on Software Engineering, Minneapolis, MN, USA, 2007:626-635.
  • 4DAIKON version 4.6.2[ EB/OL]. http ://groups. csail, mit. edu/ pag/DAIKON/, 2010 -10.
  • 5Michael D Ernst. Dynamically discovering likely program invad- ants[ D]. Dept. of Computer Science and Eng., Univ. of Wash- ington, Seattle, Wash., Aug,2000.
  • 6Michael D Ernst, Jeff H Perkins, Philip J Gut), et al. The DAIKON system for dynamic detection of likely invariants [J ]. Science of Computer Programming, Dec. 2007, 69( 1-3 ) : 35-45.
  • 7Fanping Zcng, Qing Cao, Liangliang Man, et al. Test case genexa- tion based on invariant extraction[C]. In 5th International Confer- encc on Wireless Communications, Networking and Mobile Com- puting, Sept. 2009:24-26.
  • 8Christoph Csallner, Yannis Sma~gdakis. JCrasher: an automatic robustness tester for Java[ J ]. Software: Practice and Experience, Sept. 2004, 34(11) :1025-1117.
  • 9Carlos Pacheco, Shuvcndu K Lahiri, Thomas Ball. Finding errors in. NET with fcexiback-dircctcd random testing [ C ]. In ISSTA 2008: International Symposium on Software Testing and Analysis, Seattle, Washington, July 20-24, 2008:87-95.
  • 10Carlos Pacheco, Shuvcndu K Lahiri, Michael D Ernst, ct al. Fee, d- back-directed random test generation[C]. In ICSE'07: Proceed- ings of the 29th International Conference on Software Engineering, Minneapolis, MN, USA, 2007:75-84.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部