Research on infeasible branch-based infeasible path in program

被引:0
|
作者
Lili P. [1 ]
Tiane W. [2 ]
Jiaohua Q. [1 ]
机构
[1] College of Computer and Information Engineering, Central South University of Forestry and Technology, Changsha
[2] The Commission Institute, Hunan Electric Power Transmission and Substation Construction Company, Changsha
关键词
Correlation; Data dependency; Infeasible branch; Infeasible path;
D O I
10.4156/jdcta.vol5.issue5.18
中图分类号
学科分类号
摘要
Usually, it is a tired time-consuming process to consider path condition produced from an infeasible path. Analyzing these infeasible paths can not only save test resources but also improve test efficiency, at the same time, it helps to provide valid information to optimize program structure. Based on the Dominator Tree and valid information produced during the process of program compiling, this paper presents a new technique can reduce the cost to analyze infeasible paths. To find the infeasible paths produced by data dependency, the technique first refines the Program Control Graph (PCG) and determines the interesting field by immediate dominate node of a control node, then, in this field analyzes infeasible path by the demand-driven solution. And to find the infeasible path produced by predicate subsumption, the technique first constructs the correlative predicate information pool for correlative control nodes, and finds out infeasible branches of paths by these valid information obtained in the data flow dependency and control flow dependency. During the testing, if a testing path including an infeasible branch or more, the testing path is infeasible. The experiment results show that this infeasible branch method can find more infeasible paths in the unit time, and consumes almost the same memory as other methods.
引用
收藏
页码:166 / 1747
页数:1581
相关论文
共 50 条
  • [1] Analysis of the infeasible path based on key branch
    Pan, Li-Li
    Zou, Bei-Ji
    Wang, Tian-E
    Chen, Hao
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 716 - 720
  • [2] Research on Translucent Mechanism-Based Infeasible Path
    Pan, Lili
    Zou, Baiji
    Chen, Hao
    Zhou, Haoyu
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1076 - +
  • [3] Research Progress on Infeasible Path Detecting Problem
    Zhang, Yanmei
    Jiang, Shujuan
    Han, Han
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (08) : 1931 - 1935
  • [4] Detection of infeasible path in procedure
    Chen, Rui
    Zhang, Guangmei
    Li, Xiaowei
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (16): : 86 - 88
  • [5] REDUCING THE EFFECTS OF INFEASIBLE PATHS IN BRANCH TESTING
    YATES, DF
    MALEVRIS, N
    PROCEEDINGS OF THE ACM SIGSOFT 89: THIRD SYMPOSIUM ON SOFTWARE TESTING, ANALYSIS, AND VERIFICATION ( TAV 3 ), 1989, 14 : 48 - 54
  • [6] INFEASIBLE PATH OPTIMIZATION WITH SEQUENTIAL MODULAR SIMULATORS
    BIEGLER, LT
    HUGHES, RR
    AICHE JOURNAL, 1982, 28 (06) : 994 - 1002
  • [7] Infeasible path generalization in dynamic symbolic execution
    Delahaye, Mickael
    Botella, Bernard
    Gotlieb, Arnaud
    INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 58 : 403 - 418
  • [8] An approach for detecting infeasible paths based on sub-path expansion
    Wang, Hong-Yang
    Jiang, Shu-Juan
    Wang, Xing-Ya
    Ju, Xiao-Lin
    Zhang, Yan-Mei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (08): : 1555 - 1560
  • [9] A novel approach for infeasible path optimization of distillation-based flowsheets
    Seidel T.
    Hoffmann A.
    Bortz M.
    Scherrer A.
    Burger J.
    Asprion N.
    Küfer K.-H.
    Hasse H.
    Chemical Engineering Science: X, 2020, 7
  • [10] Infeasible Path Detection Based on Code Pattern and Backward Symbolic Execution
    Song, Yang
    Zhang, Xuzhou
    Gong, Yun-Zhan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020