期刊文献+

嵌入式软件静态测试技术研究 被引量:2

On the static testing technology of embedded software
下载PDF
导出
摘要 针对嵌入式系统软件的特点,就嵌入式软件静态测试需要解决的关键技术问题进行研究。提出嵌入式软件的代码整理、静态分析和代码bug检测的实现方法,并在基于ARM的嵌入式软件宿主环境测试平台ARM-TestV1.0上测试实现。测试结果表明,所提出的嵌入式软件静态测试方法行之有效。 Considering characteristics of embedded system software,the key technology that faces the static test of embedded software is studied.The implementation methods of code settling,static analysis,and bug detecting are put forward.An experimental test of these methods on ARM-Test V1.0,which is a test platform with embedded software host environment and is based on ARM(Advanced RISC Machines),is administered and the results show that these methods work well.
出处 《西安邮电学院学报》 2011年第2期38-41,共4页 Journal of Xi'an Institute of Posts and Telecommunications
基金 陕西省自然科学基础研究计划资助项目(SJ08-ZT14) 西安市科技计划资助项目(CXY08017(1))
关键词 嵌入式软件 宿主环境 静态测试 bug检测 embedded software host environment static test bug detection
  • 相关文献

参考文献8

  • 1Hong Yu, Huang Song. Using Symbolic Execution inEmbedded Software [C]. International Conference on Computer Science and Software Engineering. Wuhan: IEEE, 2008.
  • 2范琳,王忠民,王海.基于嵌入式系统模拟器的测试平台构架[J].微计算机信息,2010,26(17):61-62. 被引量:4
  • 3陈锦富,卢炎生,谢晓东.软件错误注入测试技术研究[J].软件学报,2009,20(6):1425-1443. 被引量:28
  • 4Brian Chess, Jacob West. 安全编程:代码静态分析Secure Programming with Static Analysis [ M].董启雄,韩平,程永敬,等译.北京:机械工业出版社,2008:46-75.
  • 5SCHMITT W. Automated Unit Testing of Embedded ARM Application[J]. Information Quarterly, 2004,3 (4) :29-34.
  • 6Biega J. ITS4: A Static Vulnerability Scanner for C and C++Code [EB/OL]. [201-5-18]. http:// www. rstcorp, com.
  • 7高传平,宫云战.数组越界的静态测试分析[J].计算机工程,2006,32(3):70-72. 被引量:9
  • 8David Evans and David Larochelle. Improving Security Using Extensible Lightweight Static Analysis [J]. software, IEEE, 2002,19(1): 42-51.

二级参考文献14

  • 1王根义,马德宝,杨黎斌.基于ARM的嵌入式最小系统架构研究[J].微计算机信息,2008,24(2):163-165. 被引量:11
  • 2邓立波,龙翔,高小鹏.ArmSim全系统模拟器的设计与实现[J].微计算机信息,2008,24(2):9-11. 被引量:5
  • 3Eichin M W,Rochlis J A.With Microscope and Tweezers:An Analysis of the Internet Virus of Nov.1988[C].IEEE Symp.Security and Privacy,1989.
  • 4Austin T M,Breach S E,Sohi G S.Efficient Detection of All Pointer and Array Access Errors[C].PLDI'94,ACM,1994.
  • 5Markstein V,Cocke J,Markstein P.Optimization of Range Checking[C].Proceedings of the 1982 ACM SIGPLAN Conference on Compiler Construction,SIGPLAN Notices,1982:114-119.
  • 6Dor N,Rodeh M,Sagiv M.Cssv:Towards a Realistic Tool for Statically Detecting All Buffer Overflows inc[C].Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation,2003:155-167.
  • 7Wagner D,Foster J,Brewer E,et al.A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C].Proceedings of the Network and Distributed Systems Security Symposium,2000:3-7.
  • 8Alex Heunhe Han, Yong-Ho Ahn, Ki-Seok Chung. Virtual ARM Simulation Platform for Embedded System Developers [C]. ITC-CSCC 2008. (253-256).
  • 9Bill Blunden.虚拟机的设计与实现[M],机械工业出版社.2003.6.
  • 10Copyright 2003 ARM Limited. All rights reserved, http.//rtds. cs.tamu.edu/web_462/techdocs/ARM/appsnotes/index.htm.

共引文献38

同被引文献13

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部