期刊文献+

CCNeter:C程序代码Petri网自动建模工具 被引量:2

CCNeter:An Automatic Modeling Tool Based on Petri Nets for C Program
下载PDF
导出
摘要 CCNeter是实现扩展的Petri网——CNet自动可视化建模的工具,对程序语句从数据、操作和控制3个方面进行描述,刻画了程序代码中数据、操作以及控制之间的关系。它通过解析C工程中文件、函数模块、变量之间的依赖关系,自动形成程序的CNet规范,并根据CNet规范自动进行图形绘制和布局。CCNeter是实现程序静态分析自动化的重要前提。 CCNeter is an automatic modeling tool based on CNet,an extension of Petri nets.CCNeter respectively describes data,operations and control from a sourece code.Accordingly,on Petri nets specification the relationship among data,operation and control can be discovered.Through capturing the dependency relations among source files,functions and variables of C project,CCNeter automatically creates CNet specification for C program,then draws and lays out the specification.CCNeter is an important precondition task of static analysis of program code.
出处 《计算机科学》 CSCD 北大核心 2011年第5期96-101,共6页 Computer Science
基金 国家自然科学基金(61040036) 教育部留学回国人员科研启动基金资助项目 湖北省自然科学基金(2009CDB218) 中央高校基本科研专项资金(6082015) 高等学校学科创新引智计划(B07037)资助
关键词 PETRI网 CNET 形式化技术 自动建模 Petri nets CNet Formal method Automatic modeling
  • 相关文献

参考文献23

  • 1Zhou Guo-fu, He Guo-liang. One program model for cloud computing[C] // First International Conference on Cloud Computing, Lecture Notes in Computer Science,2009:589-594.
  • 2Liu Y S, Huang C,Xu R Z. The program control flow graph and the test path automation generation for source program[C] // 4th International Conference on Quality and Reliability(ICQR 2005). Beijing, 2005 : 847-854.
  • 3Pousot A, Cousot R. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints[C]//Proceedings of the 4th ACM SIGACTSIGPLAN Symposium on Principles of Programming Languages. Los Angeles, California:ACM, 1977 :238-252.
  • 4Spivey J M. The Z Notation:A Reference Manual[EB/OL]. http://spivey, oriel, ox. ac. uk/- mike/zrm/, 1998.
  • 5吴新松,周洲仪,贺也平,梁洪亮,袁春阳.基于静态分析的强制访问控制框架的正确性验证[J].计算机学报,2009,32(4):730-739. 被引量:4
  • 6Basili V R, Selby R W. Comparing the Effectiveness of Software Testing[J]. IEEE Transactions on Software Engineering, 1987, 13(12) : 1278-1296.
  • 7Castro M, Costa M, Harris T. Securing software by enforcing data-flow integrity[C]//Proceedings of the 7th Symposium on Operating Systems Design and Implementation. Seattle, Washington :USENIX Association, 2006 : 147-160.
  • 8梅宏,王千祥,张路,王戟.软件分析技术进展[J].计算机学报,2009,32(9):1697-1710. 被引量:101
  • 9GRAPHVIZ[EB/OL]. http://www, graphviz, org, May 5,2010.
  • 10Bjorner D, Jones C B, Airchinnigh A, et al. VDM ' 87 VDM-A Formal Method at Work[M]. Germany: Springer-Verlag,1987.

二级参考文献81

  • 1Bell David E, LaPadula Leonard J. Secure computer system: Unified exposition and MULTICS interpretation. The MITRE Corporation, Bedford, MA, USA: MTR-2997 Rev. 1, 1976
  • 2Biba K J. Integrity considerations for secure computer systems. Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, MA, USA: ESDTR-76-372, 1977
  • 3Fraser Timothy. LOMAC: Low water-mark integrity protection for COTS environments. NAI Labs Report 0775, 2000
  • 4Wright C, Cowan C, Morris J, Smalley S, Kroah-Hartman G. Linux security modules: General security support for the Linux kernel//Proceedings of the Usenix Security Symposium. Usenix Assoc. , 2002:17-31
  • 5Watson R, Morrison W, Vance C, Feldman B. The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0//Proceedings of the USENIX Annual Technical Conference. San Antonio, TX, 2003:285-296
  • 6Zhang Xiao-Lan, Edwards Antony, Jaeger Trent. Using CQUAL for static analysis of authorization hook placement// Proceedings of the 11th Usenix Security Symposium. San Francisco, California, 2002: 33-48
  • 7Edwards Antony, Jaeger Trent, Zhang Xiao-Lan. Runtime verification of authorization hook placement for the Linux security modules framework//Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC, USA, 2002: 225-234
  • 8Foster Jeffrey S, Fahndrich Manuel, Aiken Alexander. A theory of type qualifiers//Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'99). Atlanta, Georgia, 1999: 192-203
  • 9DoD 5200.28-STD, Department of defense standard. Department of Defense Trusted Computer System Evaluation Criteria. National Computer Security Center, Ft. Meade, MD, USA, 1985
  • 10Volansehi Nie. A portable compiler-integrated approach to permanent checking//Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering. Tokyo, Japan, 2006:103-112

共引文献104

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部