Error Detection by Data Flow Analysis Restricted to Executable Paths
نویسنده
چکیده
BEAM is a tool for finding errors in C++ programs by source code analysis. It uses data flow analysis to find paths leading to an error. Classical data flow analysis propagates information along all paths, including non-executable ones, which results in reporting errors that are not real. To avoid this problem, BEAM restricts data flow analysis to paths that are executable, and in addition also consistent with user’s assumptions on initial state of memory. However, the user is not required to specify his assumptions. The main contribution of this paper is an algorithm for finding an executable path to error, while avoiding path enumeration.
منابع مشابه
Executable Test Sequence for the Protocol Data Portion Based on Two Criteria
A new test sequence generation method is proposed for testing the conformance of a protocol implementation to its data portion modeled by an Extended Finite State Machine (EFSM), which is represented by a Data Flow Digraph. All-Use and IO-dfchain are two important criteria for selecting paths from the Data Flow Digraph to generate a test sequence which traces the data flow property, but it is a...
متن کاملVerifying Business Rules Using an SMT Solver for BPEL Processes
WS-BPEL is the standard for modelling executable business processes. Recently, verification of BPEL processes has been an important topic in the research community. While most of the existing approaches for BPEL process verification merely consider control-flow based analysis, some actually consider data-flows, but only in a very restrictive manner. In this paper, we present a novel approach th...
متن کاملارائه یک ماژول محاسباتی جدید برای سیستم تحلیل دیجیتالی خط ساحلی (DSAS)، جهت شناسایی دادههای مشکوک به خطا در دادههای تغییرات خط ساحلی
Digital Shoreline Analysis System (DSAS) is the most widely used tool by researchers and experts to shoreline change rate measurements. Several factors may cause uncertain data in the measured values by this tool. Understanding these errors and fix them if possible, improve the accuracy of the results. The DSAS does not have this capability. The purpose of this paper is to present a new computa...
متن کاملMining CFG as API Call-grams to Detect Portable Executable Malware
Malware writers use evasion techniques like code obfuscation, packing, compression to conceal from Anti-Virus (AV) scanners as AV use syntactic signature to detect a known malware. Our detection approach is based on semantic aspect of PE executable that analyzes API Call-grams to detect unknown malicious code. Static analysis covers all the paths of code which is not possible with dynamic behav...
متن کاملA Control-Oriented Coverage Metric and its Evaluation for Hardware Designs
Problem statement: Dynamic verification, the use of simulation to determine design correctness, is widely used due to its tractability for large hardware designs. A serious limitation of dynamic techniques is the difficulty in determining whether or not a test sequence is sufficient to detect all likely design errors. Coverage metrics are used to address this problem by providing a set of goals...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999