A static analysis method for run-time errors detection

被引:0
|
作者
Cao, WJ [1 ]
Xu, SH [1 ]
Shi, ZG [1 ]
机构
[1] Armored Force Engn Inst, Dept Informat Engn, Beijing 100072, Peoples R China
关键词
D O I
暂无
中图分类号
TH7 [仪器、仪表];
学科分类号
0804 ; 080401 ; 081102 ;
摘要
The increase in size and complexity of current applications results in rising testing costs. When it comes to finding run-time errors, classical methods are inadequate. Today's applications require a new generation testing solution that is capable of improving software quality while reducing the usual costs. To ensure that a program can never perform a run-time error, this article describes a purely automatic static analysis method to find sound approximation of run-time error. Run-time error discussed here is invalid arithmetic operation. This static detection method is developed which depends upon the existence of a ''fault/failure model." The method is defined formally based on program data-flow analysis algorithm, abstract interpretation theory and fault/failure model. This method is sufficiently general that besides invalid arithmetic operations, it can be extended immediately when the fault/failure models of other kinds of run-time errors have been defined. The method described in this article will always discover all bugs which have been modeled, however, may find false alarms.
引用
收藏
页码:6615 / 6618
页数:4
相关论文
共 50 条
  • [21] Run-time malware detection based on IRP
    Zhang F.-Y.
    Qi D.-Y.
    Hu J.-L.
    [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (02): : 113 - 117
  • [22] Run-time spatial locality detection and optimization
    Johnson, TL
    Merten, MC
    Hwu, WW
    [J]. THIRTIETH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, 1997, : 57 - 64
  • [23] Run-time Attack Detection in Cryptographic APIs
    Focardi, Riccardo
    Squarcina, Marco
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 176 - 188
  • [24] Run-time efficient feasibility analysis of uni-processor systems with static priorities
    Albers, Karsten
    Bodmann, Frank
    Slomka, Frank
    [J]. EMBEDDED SYSTEM DESIGN: TOPICS, TECHNIQUES AND TRENDS, 2007, 231 : 37 - +
  • [25] A Method of Run-Time Detecting DDoS Attacks
    Li, Muhai
    Li, Ming
    [J]. PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 393 - +
  • [26] Using Run-Time Information to Enhance Static Analysis of Machine Learning Code in Notebooks
    Wang, Yiran
    Lopez, Jose Antonio Hernandez
    Nilsson, Ulf
    Varro, Daniel
    [J]. COMPANION PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, FSE COMPANION 2024, 2024, : 497 - 501
  • [27] A full automatic detection method for security policy of JVM run-time library
    [J]. Sun, J.-H. (jhsun@aimlab.org), 1600, Chinese Institute of Electronics (41):
  • [28] Signature-based method for run-time fault detection in communication protocols
    Noubir, G
    Vijayananda, K
    Nussbaumer, HJ
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (05) : 405 - 421
  • [29] A scalable method for run-time loop parallelization
    Rauchwerger, L
    Amato, NM
    Padua, DA
    [J]. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 1995, 23 (06) : 537 - 576
  • [30] A method for fast hardware specialization at run-time
    Bruneel, Karel
    Bertels, Peter
    Stroobandt, Dirk
    [J]. 2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2, 2007, : 35 - 40