期刊文献+

基于GCC的C/C++源程序静态信息提取技术 被引量:5

Extracting the Static Information From C/C++ Source Code Based on GCC
下载PDF
导出
摘要 给出了一种基于GCC的AST中间文件来提取C/C++语言源程序静态信息的方法。主要思想是利用GCC编译源程序时产生的AST文件,借助XOgastan工具将其转换成GXL格式文件,然后从GXL格式文件转换成标准的XML文档,最后树形化地显示源程序的结构关系。 A method of extracting the static information from C/C++ source code based on AST dumped by GCC is presented.The method uses XOgastan tools to translate AST files dumped by GCC into GXL documents,and then translates GXL documents to XML format.At last,the structure of program is displayed in tree view.
出处 《计算机与数字工程》 2011年第2期152-155,166,共5页 Computer & Digital Engineering
基金 "十一五"装备预先研究基金项目"典型软件密集型装备综合诊断技术"(编号:513270104)资助
关键词 GCC 抽象语法树 XOgastan XML 信息提取 GCC AST XOgastan XML information extraction
  • 相关文献

参考文献12

  • 1Stallman R M Using and Porting the GNU Compiler Collection[EB/OL].[2003-07-10].http://gcc.gnu.org/onlinedoes.
  • 2吴佩华,尉红梅,等.GCC编译系统分析[J].高性能计算技术,2003,0(1):21-24. 被引量:3
  • 3cygwin/gccMinGW[EB/OL].http://blog.csdn.net/listlike/archive/2005/05/12/373999.aspx.
  • 4MinGW的安装法[EB/OL].http://blog.chinaunix.net/u/16953/showart.php?id=1083247.
  • 5gcc for windows开发环境介绍[EB/OL].http://blog.cs-dn.net/Mobidogs/archive/2007/10/10/1819084.aspx.
  • 6Arthur Griffith.GCC:The Complete Reference[M].New York:The McGraw-Hill Companies,2002:506-514.
  • 7GCC Command Options[EB/OL].http://gcc.gnu.org/onlinedoes/gcc-3.0.4/gcc_3.html.
  • 8石峰,刘坚.一种解析GCC抽象语法树的方法[J].计算机应用,2004,24(3):115-116. 被引量:8
  • 9李鑫,王甜甜,苏小红等.消除GCC抽象语法树文本中冗余信息的算法研究.计算机工程与应用,2004,.
  • 10Xml Orientend Gnu AST Analyzer[EB/OL].[2010-08-10].http://xogastan.sourceforge.net.

二级参考文献5

共引文献13

同被引文献49

  • 1吕维梅,刘坚.C/C++程序安全漏洞的分类与分析[J].计算机工程与应用,2005,41(5):123-125. 被引量:18
  • 2郑玉彤.库函数调用的安全性分析[J].微计算机应用,2006,27(3):319-322. 被引量:2
  • 3. Patterson, Jason R. C. Accurate static branch prediction by value range propagation[-C. In SIGPLAN conference on pro- gramming language design and implementation, 1995:67-78.
  • 4A. I SOTIROV. Automatic vulnerability detection using static source code analysis Final thesis Department of Computer Sci- ence in the Graduate School of University of Alabama. April 2007, http://gcc, vulncheck, org/sotirov05automatic, pdf.
  • 5Kamran Zafar, Asad Ali; Static Techniques for Vulnerability Detection; Link6pings university, October 2007, http//www. ida. liu. se/TDDCO3/oldprojects/2OO7/projects/4, pdf.
  • 6David A. Wheeler. Flawfinder, April 2007, http://www. dwheeler, com/flawfinder/.
  • 7J. Viega, J. T. Bloch, T. Kohno, and G. McGraw,. ITS4 : A static vulnerability scanner for C and Cq-q- codeC]// 16th Annual Computer Security Applications Conference. ACM, Dec, 2000.. 101-116.
  • 8J. Wilander, M. Kamkar. A comparative study of publicly avail able tools for static intrusion preventionJ-C]// Proceedings of the 7th Nordic Workshop on Secure IT Systems, Karlstad, Sweden, November, 2002 .. 82-90.
  • 9AlephOne. Smashing The Stack For Fun And Profit, Phrack, 1996, (49) : 1-5.
  • 10Novillo, Diego. Tree SSA-A new optimization infrastructure for GCCI-C. In Proceedings of the 2003 gcc developers, Otta- wa, Canada, 2003 : 181-195.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部