Bug path reduction strategies for symbolic execution

Symbolic execution is one of the most powerful tools in static analysis for finding bugs. In this technique the source code is not executed by the CPU, but interpreted statement-by-statement by preserving their semantics as much as possible. During the interpretation the possible values of variables...

Teljes leírás

Elmentve itt :
Bibliográfiai részletek
Szerzők: Brunner Tibor
Szécsi Péter
Porkoláb Zoltán
Testületi szerző: Conference of PhD students in computer science (11.) (2018) (Szeged)
Dokumentumtípus: Könyv része
Megjelent: 2018
Sorozat:Conference of PhD Students in Computer Science 11
Kulcsszavak:Programozás, Számítástechnika
Online Access:http://acta.bibl.u-szeged.hu/61792
Leíró adatok
Tartalmi kivonat:Symbolic execution is one of the most powerful tools in static analysis for finding bugs. In this technique the source code is not executed by the CPU, but interpreted statement-by-statement by preserving their semantics as much as possible. During the interpretation the possible values of variables are recorded so the analyzer can report when a variable gets to an invalid state. An additional benefit of such a provided bug report is that not only the place of the bug is returned but the control flow is also displayed which results the erroneous program state. Many times the bug path contains statements which are not related to the bug. These irrelevant statements make it harder to understand in the debugging process, how the error can occur. In this article we present three methods for shortening the bug paths by removing unnecessary bug points and by recognizing two different bug paths as unique if those refer the same bug.
Terjedelem/Fizikai jellemzők:159-162