期刊文献+

一种自动机学习和符号化执行的软件自动测试方法 被引量:1

Automatic Program Testing with Dynamic Symbolic Execution and Model Learning
下载PDF
导出
摘要 针对高可信软件提出一种软件脆弱性自动测试方法。与传统测试方法不同,该方法对待测试程序进行预处理,使用自动机学习算法构造软件与环境交互的抽象机模型,在符号化执行迭代过程中利用抽象机模型指导符号化执行,并动态生成测试数据,同时精化交互抽象机用于后继的符号化迭代测试。解决了传统符号化执行测试技术中缺乏指引、具有较高盲目性的问题,同时也提高了符号化执行测试的效率和代码覆盖率。 An automatic testing approach was proposed with dynamic symbolic execution and model learning. The model that represents I/O interaction of program with its environment was constructed by stepwise learning algorithm. With abstract interaction model, the process of dynamic execution is guided by states of the model,and test data is automati- cally generated. Abstract interaction model is also refined by the test data and used for further execution. The problem that traditional symbolic execution lacks guidance is solved, and its speed and code coverage rate are also improved.
出处 《计算机科学》 CSCD 北大核心 2013年第8期161-164,共4页 Computer Science
基金 中央高校自主科研基金(CCNU11A01012 CCNU11A02007) 湖北省自然科学基金(2010CDB04001)资助
关键词 自动机 自动测试 符号化执行 抽象机 Automation Auto testing Symbolic execution Abstract machine
  • 相关文献

参考文献9

  • 1Cazefroid P, Klarlund N. DART: Directed Automated Random Testing [C]//PLDI05. Chicago,Illinois,USA,June 2005: 12-15.
  • 2King J C,Wegbreit B. Symbolic Execution and Program Testing [J], Communications of the ACM on Programming Languages, 1976,19 (7) : 385-394.
  • 3Sen T, Mall R. State-Model-Based Regression Test Reduction for Component-Based Software [J]. ISRN Software Enginee- ring, 2012(7) : 15-26.
  • 4Alsmadi I. Advanced Automated Software Testing:Frameworks for Refined Practice [M]. Yarmouk University, Jordan, 2012: 209-224.
  • 5Cho C Y, Babi D, Poosankam P. MACE: Model-inference-Assis- ted Concolic Exploration for Protocol and Vulnerability Disco- veryEC3 ffProceedings of the 20th USENIX conference on Secu- rity(SEC 11). Usenix, 2011 : 78-90.
  • 6Angluin D. Learning regular sets from queries and counterexarn- ples[J]. Information and Computation, 1987,75 (2) : 87-106.
  • 7Shahbaz M, Groz R. Inferring Mealy machines [C]//FM' 09: Pro of the 2nd World Congress on Formal Methods. Springer, 2009 : 207-222.
  • 8Shu Guo-qiang, Lee D. Testing Security Properties of Protocol Implementations-a Machine Learning Based Approach [C]// 27th International Conference on Distributed Computing Sys- tems(ICIXkS'07). 2007 : 34-43.
  • 9Zhang Da-zhi, Liu Dong-gang, Wang Wen-hua. Detecting Vul- nerabilities in C Programs Using Trace-Based Testing[C] // Proc. 40th Annual IEEE/IFIP International Conference on De- pendable Systems and Networks. IEEE Publisher, 2010 : 241-250.

同被引文献10

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部