期刊文献+

A novel formal approach to program slicing 被引量:3

A novel formal approach to program slicing
原文传递
导出
摘要 Program slicing is a well-known program analysis technique that extracts the elements of a program related to a particular computation. The current slicing methods, however, are singular (mainly based on a program or system dependence graph), and lack good reusability and flexibility. In this paper, we present a novel formal method for program slicing, modular monadic program slicing, which abstracts the computation of program slicing as a slice monad transformer, and applies it to semantic descriptions of the program analyzed in a modular way, forming the corresponding monadic slicing algorithms. The modular abstraction mechanism allows our slicing method to possess excellent modularity and language-flexibility properties. We also give the related axioms of our slice monad transformer, the proof of the correctness and the implementation of monadic slicing algorithms. We reveal the relations of our algorithms and graph-reachable slicing algorithms. Program slicing is a well-known program analysis technique that extracts the elements of a program related to a particular computation. The current slicing methods, however, are singular (mainly based on a program or system dependence graph), and lack good reusability and flexibility. In this paper, we present a novel formal method for program slicing, modular monadic program slicing, which abstracts the computation of program slicing as a slice monad transformer, and applies it to semantic descriptions of the program analyzed in a modular way, forming the corresponding monadic slicing algorithms. The modular abstraction mechanism allows our slicing method to possess excellent modularity and language-flexibility properties. We also give the related axioms of our slice monad transformer, the proof of the correctness and the implementation of monadic slicing algorithms. We reveal the relations of our algorithms and graph-reachable slicing algorithms.
出处 《Science in China(Series F)》 2007年第5期657-670,共14页 中国科学(F辑英文版)
基金 Supported by the Natural Science Research Plan for High School of Jiangsu Province (Grant No. 05KJD520151)
关键词 program slicing MONADS MODULARITY slice monad transformer formal semantics program slicing, monads, modularity, slice monad transformer, formal semantics
  • 相关文献

参考文献1

二级参考文献3

共引文献34

同被引文献19

  • 1Molnar D A,Wagner D.Catchconv:Symbolic Execution and Run-Time Type Inference for Integer Conversion Errors. Technical Report UCB/EECS-2007 -23 . 2007
  • 2Ghosh A K,O’’’’’’’’Connor T,McGraw G.Automated approach for identifying potential vulnerabilities in software. Proceedings of the IEEE Symposium on Security and Privacy . 1998
  • 3Sutton M,Greene A,Amini P.Fuzzing:Brute Force Vulnerability Discovery. . 2007
  • 4Godefroid P,Kiezun A,Levin M Y.Grammar-based whitebox fuzzing. Proceedings of the2008ACM SIGPLAN Conference on Programming Language Design and Implementation . 2008
  • 5Akritidis P,Cadar C,Raiciu C,et al.Preventing memory error exploits with WIT. Proceedings of the IEEE Symposium on Security and Privacy . 2008
  • 6Dimitrov M,Zhou H.Anomaly-based bug prediction,isolation,and validation:an automated approach for software debugging. Proceeding of the14th International Conference on Architectural Support for Programming Languages and Operating Systems . 2009
  • 7Gegick M,Rotella P,Williams L.Predicting attack-prone components. Proceedings of the2009International Conference on Software Testing Verification and Validation . 2009
  • 8Jiang Y,Cuki B,Menzies T,et al.Comparing design and code metrics for software quality prediction. Proceedings of the4th International Workshop on Predictor Models in Software Engineering . 2008
  • 9P. Godefroid,M. Y. Levin,D. Molnar.Automated Whitebox Fuzz Testing. Proceedings of NDSS‘2008 (Network and Distributed Systems Security) . 2008
  • 10Cristian Cadar,Vijay Ganesh,Peter M Pawlowski,David L. Dill,Wawson R. Engler.EXE: Automatically Generating Inputs of Death. Proceedings of the 13th ACM conference on Computer and communications security . 2006

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部