A Static Analyzer for Model Transformations
نویسندگان
چکیده
Adoption of the Model-Driven Architecture approach is increasing each day. As any other software development project, a MDA-based project is constantly evolving given that software requirements change along their lifecycle. Thus, changes in MDA transformations are also frequent. These changes are hard and error-prone tasks when manually accomplished. We propose a static analyzer for inspecting the source code of ATL transformations. It provides an API comprising methods to extract and handle diverse elements from ATL transformations. Therefore, the proposed static analyzer can be useful during several development tasks of MDA-based projects, such as maintenance and debugging, since it enables developers to save effort and development time by automatically identifying dependences and relations from transformation elements.
منابع مشابه
Refinement calculus for a simple certification of static polyhedral analysis with code transformations
A static analyzer such as ASTRÉE [CCF05, BCC10] is able to ensure safety of critical software, i.e. the absence of runtime overflows. But ASTRÉE is itself a very complex software and its full formal verification seems currently impossible. A more feasible alternative might be to make the analyzer produce a formally verifiable certificate. Such a certificate would summarize the proof of safety f...
متن کاملStatic Analysis of Executables to Detect Malicious Patterns
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game between malicious code writers and researchers working on malicious code detection. Malicious code writers attempt to obfuscate the malicious code to subvert the malicious code ...
متن کاملHauptseminar: Security - Zwischen formalen Methoden und Praxis Malicious code detection
In any defense mechanism, malicious code detection is a crucial component. To subvert malicious code detectors, e.g anti-virus software, malicious code writers try to subvert these detectors by obfuscating the malicious code. As testing results surprisingly showed, commercial virus scanners were not able to detect infected binaries which were transformed by applying simple obfuscation technique...
متن کاملIncorporating Static Analysis in a Combinator-Based Compiler
We show how restructuring a denotational definition leads to a more etlicient compiling algorithm. Three semantics-preserving transformations (static replacement, factoring, and combinator selection) are used to convert a continuation semantics into a formal description of a semantic analyzer and code generator. The compiling algorithm derived below performs type checking before code generation...
متن کاملVerification of Graph-based Model Transformations Using Alloy
Model transformations are fundamental in model driven development. Thus, verification of model transformations is indispensable to ensure the quality and the reliability of transformation results. In this paper we focus on graph-based model transformation systems using the double-pushout (DPO) approach and study their correctness w.r.t. conformance. It means that, given a transformation system ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011