期刊文献+

一种建立控制依赖子图的方法 被引量:2

Method of Building Control Dependence Sub-graph
下载PDF
导出
摘要 提出一种基于GCC(GNU Compiler Collection)抽象语法树文本建立控制依赖子图的方法,消除抽象语法树文本中与分析控制流无关的信息,将消除冗余后的抽象语法树文本转化为以邻接表为存储结构的抽象语法树的算法,从而高效地完成了抽象语法树的解析。基于以邻接表为存储结构的抽象语法树建立了控制依赖子图。通过实验证明了该方法的正确性和适用性。 A method of building control dependence sub-graph is put forward based on Abstract Syntax Tree(AST) text produced by GNU Compiler Collection(GCC). The information which has nothing to do with control flow analysis is eliminated. An algorithm of transforming canonical AST text to AST is put forward. As a result, the AST analysis is more efficiently completed. Control dependence sub-graph is built based on canonical AST. The correctness and practicality of this method is proved by experiments.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第15期50-52,共3页 Computer Engineering
关键词 抽象语法树 抽象语法树文本 抽象语法树的解析 规范化的抽象语法树文本 冗余 控制依赖子图 Abstract Syntax Tree(AST) AST text AST parsing Canonical AST text redundancy control dependence sub-graph
  • 相关文献

参考文献5

  • 1石峰,刘坚.一种解析GCC抽象语法树的方法[J].计算机应用,2004,24(3):115-116. 被引量:8
  • 2Power J E Program Annotation in XML:A Parse-tree Based Approach[C]//Proc.of the 9th Working Conference on Reverse Engineering.[S.l.]:IEEE Press,2002:1095-1350.
  • 3Antoniol G.XML-oriented GCC AST Analysis and Transformations[C]//Proc.of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation.[S.l.]:IEEE Press,2005:869-901.
  • 4Wang Tiantian,Su Xiaohong,Wang Yuying,et al.Semantic Similarity-based Grading of Student Programs[J].Information and Software Technology,2007,49(2):99-107.
  • 5Lanza M,Crawler C.Lessons Learned in Building a Software Visualization Tool[C]//Proc.of the European Conference on Software Maintenance and Reengineering.Benevento,Italy:IEEE Press,2003:409-418.

共引文献7

同被引文献31

  • 1NIELSON F, NIELSON H R, HANKIN C. Principles of program analysis [M]. Secaucus, NJ, USA: Springer-Verlag, 2005.
  • 2NAUMOVICH Gleb. Using the observer design pattern for implementation of data flow analysis [J].ACM Software Engineering, 2003, 28 (1): 61-68.
  • 3FOWLER M. Refactoring:improving the design of existing programs [M]. New York: Addison Wesley, 1999.
  • 4GNOME. GLib reference manual [M/OL]. [2001-01-02]. http://library.gnome.org/devel/glib.
  • 5WANG Tian-tian, SU Xiao-hong, WANG Yu ying, et al Semantic similarity based grading of student program[J].Information and Software Technology, 2007, 49 (2) 99-107.
  • 6ANTONIOL G. XML-oriented GCC AST analysis and transformations [C]// proc. of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation. [S. 1.]: IEEE Press, 2005: 869-901.
  • 7LANZA M, CRAWLER C. lessons learned in building a software visualization tool [C]// Proc. of the European Conference on Software Maintenance and Reengineering. Benevento, Italy: IEEE Press, 2003:409-418.
  • 8Sandu R S,Samaratiy P.Access Control Principles and Practice[J].IEEE Communications Magazine,1994,32(9):40-48.
  • 9Krsul I V.Software Vulnerability Analysis[D].West Lafayette:Purdue University,1998.
  • 10Li Peng,Cui Bao-jiang.A Comparative Study on Software Vulnerability Static Analysis Techniques and Tools[C]∥2010 IEEE International Conference on Information Theory and Information Security.Beijing,China:IEEE Press,2010:521-524.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部