A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects

نویسندگان

  • Hui He
  • Dongyan Zhang
  • Min Liu
  • Weizhe Zhang
  • Dongmin Gao
چکیده

Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out. Once these vulnerabilities are exploited, it may lead to great loss. In this situation, the concept of Software Assurance is carried out by some experts. And the automated fault localization technique is a part of the research of Software Assurance. Currently, automated fault localization method includes coverage based fault localization (CBFL) and program slicing. Both of the methods have their own location advantages and defects. In this paper, we have put forward a new method, named Reverse Data Dependence Analysis Model, which integrates the two methods by analyzing the program structure. On this basis, we finally proposed a new automated fault localization method. This method not only is automation lossless but also changes the basic location unit into single sentence, which makes the location effect more accurate. Through several experiments, we proved that our method is more effective. Furthermore, we analyzed the effectiveness among these existing methods and different faults.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Program Slicing Technique to Reduce the Cost of Software Testing

Systems of computers and their application in the lives of modern human beings are vastly expanding. In any kind of computer application, failure in computer systems can lead to a range of financial and mortal losses. Indeed, the major origin of software failure can be located in designing or implementing software. With regard to these statistics, 30% of the software projects have been prospero...

متن کامل

An Evolutionary Testing Approach to detect Buffer Overflows

Testing activity consumes about 50% of software development resources thus any technique aimed at reducing software testing costs is likely to produce positive effects. Indeed, exhaustive and thorough testing is often too expensive and unfeasible due to resource constraints. Unfortunately, defects slipped into deployed software may be the cause of threats to human beings or unacceptable economi...

متن کامل

Slicing Event Traces of Large Software Systems

Debugging of large software systems consisting of many processes accessing shared resources is a very difficult task. Many commercial systems record essential events during system execution for post-mortem analysis. However, the event traces of large and long-running systems can be quite voluminous. Analysis of such event traces to identify sources of incorrect behavior can be very tedious, err...

متن کامل

Applying Incremental Model Slicing to Product-Line Regression Testing

One crucial activity in software product line (SPL) testing is the detection of erroneous artifact interactions when combined for a variant. This detection is similar to the retest test-case selection problem in regression testing, where change impact analysis is applied to reason about changed dependencies to be retested. In this paper, we propose automated change impact analysis based on incr...

متن کامل

Statechart Slicing

The paper discusses how to reduce statecharts model by slicing. We start with the discussion of control dependencies and data dependencies in statecharts. The andor statechart dependence graph is introduced to represent control and data dependecies for statecharts. We show how to slice statecharts by using this dependence graph. Our slicing approach helps systems analysts and systems designers ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014