Research on infeasible branch-based infeasible path in program

被引:0
|
作者
Lili P. [1 ]
Tiane W. [2 ]
Jiaohua Q. [1 ]
机构
[1] College of Computer and Information Engineering, Central South University of Forestry and Technology, Changsha
[2] The Commission Institute, Hunan Electric Power Transmission and Substation Construction Company, Changsha
关键词
Correlation; Data dependency; Infeasible branch; Infeasible path;
D O I
10.4156/jdcta.vol5.issue5.18
中图分类号
学科分类号
摘要
Usually, it is a tired time-consuming process to consider path condition produced from an infeasible path. Analyzing these infeasible paths can not only save test resources but also improve test efficiency, at the same time, it helps to provide valid information to optimize program structure. Based on the Dominator Tree and valid information produced during the process of program compiling, this paper presents a new technique can reduce the cost to analyze infeasible paths. To find the infeasible paths produced by data dependency, the technique first refines the Program Control Graph (PCG) and determines the interesting field by immediate dominate node of a control node, then, in this field analyzes infeasible path by the demand-driven solution. And to find the infeasible path produced by predicate subsumption, the technique first constructs the correlative predicate information pool for correlative control nodes, and finds out infeasible branches of paths by these valid information obtained in the data flow dependency and control flow dependency. During the testing, if a testing path including an infeasible branch or more, the testing path is infeasible. The experiment results show that this infeasible branch method can find more infeasible paths in the unit time, and consumes almost the same memory as other methods.
引用
收藏
页码:166 / 1747
页数:1581
相关论文
共 50 条
  • [21] An infeasible path-following method for monotone complementarity problems
    Tseng, P
    SIAM JOURNAL ON OPTIMIZATION, 1997, 7 (02) : 386 - 402
  • [22] Path Sensitive MFP Solutions in Presence of Intersecting Infeasible Control Flow Path Segments
    Pathade, Komal
    Khedker, Uday P.
    PROCEEDINGS OF THE 28TH INTERNATIONAL CONFERENCE ON COMPILER CONSTRUCTION (CC '19), 2019, : 159 - 169
  • [23] Detecting Infeasible Branches Based on Code Patterns
    Ding, Sun
    Zhang, Hongyu
    Tan, Hee Beng Kuan
    2014 SOFTWARE EVOLUTION WEEK - IEEE CONFERENCE ON SOFTWARE MAINTENANCE, REENGINEERING, AND REVERSE ENGINEERING (CSMR-WCRE), 2014, : 74 - +
  • [24] Infeasible path optimal design methods with applications to aerodynamic shape optimization
    Orozco, CE
    Ghattas, ON
    AIAA JOURNAL, 1996, 34 (02) : 217 - 224
  • [25] An infeasible-start path-following method for monotone LCPs
    Zhang, PI
    Li, XS
    MATHEMATICAL AND COMPUTER MODELLING, 2003, 38 (1-2) : 23 - 31
  • [26] A PATH GENERATION METHOD FOR TESTING LCSAJS']JS THAT RESTRAINS INFEASIBLE PATHS
    MALEVRIS, N
    INFORMATION AND SOFTWARE TECHNOLOGY, 1995, 37 (08) : 435 - 441
  • [27] Infeasible basis paths detection of program with exception-handling constructs
    Zhang, Yanmei
    Jiang, Shujuan
    Wang, Qingtan
    Zhao, Xuefeng
    International Journal of Advancements in Computing Technology, 2012, 4 (01) : 492 - 503
  • [28] Approximate Bit Dependency Analysis to Identify Program Synthesis Problems as Infeasible
    Kamp, Marius
    Philippsen, Michael
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2021, 2021, 12597 : 353 - 375
  • [29] Identification of potentially infeasible program paths by monitoring the search for test data
    Bueno, PMS
    Jino, M
    FIFTEENTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2000, : 209 - 218
  • [30] An Approach for Detecting Infeasible Paths Based on a SMT Solver
    Jiang, Shujuan
    Wang, Hongyang
    Zhang, Yanmei
    Xue, Meng
    Qian, Junyan
    Zhang, Miao
    IEEE ACCESS, 2019, 7 : 68058 - 68069