期刊文献+

基于缺陷模式的软件测试中的区间运算应用 被引量:14

The Application of Interval Computation in Software Testing Based on Defect Patterns
下载PDF
导出
摘要 基于缺陷模式的软件测试采用静态分析技术,误报问题比较严重.通过对区间数学理论扩展,提出了区间集的运算,以及实数、布尔变量、句柄变量、数组变量等不同数据类型的区间计算方法;采用May和Must集合来描述条件语句对区间的限定;通过修改数据流方程来跟踪控制流图遍历中的区间变化.将区间运算应用于基于缺陷模式的软件测试,实验结果表明,区间运算能够较好地减少误报和提高缺陷检测精度. Lowering the false positive rate is a challenge for software testing based on defect patterns. This paper expands the typical interval computation and proposes a method for interval set computation. The proposed interval computation of various data types include real number variable, Boolean variable, pointer variable and array variable. May and Must set are used to compute interval restricted by conditional statement. Updated data flow equation is used to compute variables' interval in control flow traverse. The interval computation is used in software testing based on defect patterns. Experimental results show that it can reduce false positives and provide necessary information for defect testing.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2008年第12期1630-1635,共6页 Journal of Computer-Aided Design & Computer Graphics
基金 国家“八六三”高技术研究发展计划(2006AA01Z184,2007AA010302)
关键词 软件测试 静态分析 区间运算 缺陷模式 状态机 software testing static analysis interval computation defect patterns state machine
  • 相关文献

参考文献11

  • 1王志言,刘椿年.区间算术在软件测试中的应用[J].软件学报,1998,9(6):438-443. 被引量:19
  • 2高传平,谈利群,宫云战,张威.基于整型区间集的数组越界静态自动测试方法研究[J].小型微型计算机系统,2006,27(12):2222-2227. 被引量:3
  • 3Ghodrat M A, Givargis T, Nicolau A. Expression equivalence checking using interval analysis [J]. IEEE Transactions on Very Large Scale Integration Systems, 2006, 14(8): 830-842.
  • 4Ngo M N, Tan H B K. Detecting large number of infeasible paths through recognizing their patterns [C] //Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Dubrovnik, Croatia,2007:215-224.
  • 5http://gaol, sourceforge, net/.
  • 6http://www, math. uni-wuppertal, de/wrswt/software/filib, html.
  • 7http://interval, sourceforge, net/interval/index, html.
  • 8http://www, netlib, org/blas/blast-forum/.
  • 9http://jlint, sourceforge, net.
  • 10http://findbugs, sourceforge, net.

二级参考文献12

  • 1郝瑞兵,吴建平.测试集自动生成工具TUGEN的设计与实现[J].软件学报,1994,5(5):26-28. 被引量:2
  • 2刘椿年,软件学报,1996年,7卷,专刊,303页
  • 3Huang J C,Comput Surv,1995年,7卷,3期,113页
  • 4Harrison W H.Compiler analysis of the value ranges for variables[J].IEEE Transactions on Software Engineering,1977,3(3):243-250.
  • 5Wagner D,Foster J,Brewer E.A first step towards automated detection of buffer overrun vulnerabilities[C].In:Symposium on Network and Distributed Systems Security,2000:3-17.
  • 6Gupta R.A fresh look at optimizing array bound checking[C].Proceedings of the ACM SIGPLAN90 Conference on ProgrammingLanguage Design and Implementation,New York,1990,(20-22):272-282.
  • 7Kolte P,Wolfe M.Elimination of redundant array subscript range checks[C].In:ACM Siglan Noticves-International Conference on Programming Language Design and Implementation,La Jolla,CA,USA,June 1995:270-278.
  • 8Bodik R,Gupta R,Sarkar V.ABCD:eliminating arraybounds checks on demand[C].In:ACM Sigplan Conference on Programming LanguageDesign and Implementation,Vancouver,Canada,June 2000:321-333.
  • 9Suzuki N,Ishihata K.Implementation of an array bound checker[C].In:ACM Symposium Principles of Programming Languages,1977:132-143.
  • 10Larochelle D,Evans D.Statically detecting likely buffer overflow vulnerabilities[J].In:ACM SIGPLAN-SIGACT Conference on the Principles of Programming Languages (POPL),January 2002.177-190.

共引文献19

同被引文献111

  • 1单锦辉,姜瑛,孙萍.软件测试研究进展[J].北京大学学报(自然科学版),2005,41(1):134-145. 被引量:138
  • 2蒋芃,李健.计算机软件测试管理应用研究[J].湖南理工学院学报(自然科学版),2007,20(1):42-44. 被引量:1
  • 3肖庆,杨朝红,毕学军.一种基于故障模式状态机的测试方法[J].北京化工大学学报(自然科学版),2007,34(A01):73-76. 被引量:11
  • 4Engler D,Chelf B,Chou A,et al.Checking system rules using system-specific,programmer-written compiler extensions[C] //OSDI 2000.San Diego:[s.n.] ,2000:1-16.
  • 5Ashcraft K,Engler D.Using programmer-written compiler extensions to catch security holes[C] //IEEE Symposium on Security and Privacy.Washington:IEEE CS,2002:143-159.
  • 6Hovemeyer D,Pugh W.Finding bugs is easy[J].ACM SIGPLAN Notices,2004,39(12):92-106.
  • 7Hallem S,Chelf B,Xie Yichen,et al.A system and language for building system-specific,static analyses[C] //PLDI 2002.Berlin:[s.n.] ,2002:69-82.
  • 8Das M,Lerner S,Seigle M.Path-sensitive program verification in polynomial time[C] //PLDI 2002.Berlin:[s.n.] ,2002:57-68.
  • 9John P B.An efficient way to find the side effects of procedure calls and the aliases of variables[C] //POPL 1979.New York:ACM,1979:29-41.
  • 10Cooper K D,Kennedy K.Interprocedural side-effect analysis in linear time[J].ACM SIGPLAN Notice,1988,23(7):57-66.

引证文献14

二级引证文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部