Error Detection by Data Flow Analysis Restricted to Executable Paths

نویسنده

  • D. Brand
چکیده

BEAM is a tool for finding errors in C++ programs by source code analysis. It uses data flow analysis to find paths leading to an error. Classical data flow analysis propagates information along all paths, including non-executable ones, which results in reporting errors that are not real. To avoid this problem, BEAM restricts data flow analysis to paths that are executable, and in addition also consistent with user’s assumptions on initial state of memory. However, the user is not required to specify his assumptions. The main contribution of this paper is an algorithm for finding an executable path to error, while avoiding path enumeration.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Executable Test Sequence for the Protocol Data Portion Based on Two Criteria

A new test sequence generation method is proposed for testing the conformance of a protocol implementation to its data portion modeled by an Extended Finite State Machine (EFSM), which is represented by a Data Flow Digraph. All-Use and IO-dfchain are two important criteria for selecting paths from the Data Flow Digraph to generate a test sequence which traces the data flow property, but it is a...

متن کامل

Verifying Business Rules Using an SMT Solver for BPEL Processes

WS-BPEL is the standard for modelling executable business processes. Recently, verification of BPEL processes has been an important topic in the research community. While most of the existing approaches for BPEL process verification merely consider control-flow based analysis, some actually consider data-flows, but only in a very restrictive manner. In this paper, we present a novel approach th...

متن کامل

ارائه یک ماژول محاسباتی جدید برای سیستم تحلیل دیجیتالی خط ساحلی (DSAS)، جهت شناسایی داده‌های مشکوک به خطا در داده‌های تغییرات خط ساحلی

Digital Shoreline Analysis System (DSAS) is the most widely used tool by researchers and experts to shoreline change rate measurements. Several factors may cause uncertain data in the measured values by this tool. Understanding these errors and fix them if possible, improve the accuracy of the results. The DSAS does not have this capability. The purpose of this paper is to present a new computa...

متن کامل

Mining CFG as API Call-grams to Detect Portable Executable Malware

Malware writers use evasion techniques like code obfuscation, packing, compression to conceal from Anti-Virus (AV) scanners as AV use syntactic signature to detect a known malware. Our detection approach is based on semantic aspect of PE executable that analyzes API Call-grams to detect unknown malicious code. Static analysis covers all the paths of code which is not possible with dynamic behav...

متن کامل

A Control-Oriented Coverage Metric and its Evaluation for Hardware Designs

Problem statement: Dynamic verification, the use of simulation to determine design correctness, is widely used due to its tractability for large hardware designs. A serious limitation of dynamic techniques is the difficulty in determining whether or not a test sequence is sufficient to detect all likely design errors. Coverage metrics are used to address this problem by providing a set of goals...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999