期刊文献+

程序分片技术及应用 被引量:1

Program Slicing
下载PDF
导出
摘要 程序分片是一种分析和理解程序的技术.系统介绍了程序分片的概念、计算方法及分片工具、应用领域、研究现状和发展趋势等方面的问题. Program slicing is an approach to analyzing and understanding program. In this paper,the concept and the computation of program slicing are discussed,the tool and the application of program slicing are presented, and the current problem and future development are analyzed.
出处 《大连民族学院学报》 CAS 2001年第3期1-6,9,共7页 Journal of Dalian Nationalities University
基金 国家教育部骨干教师基金.
关键词 程序分片 控制流图 数据依赖 控制依赖 系统依赖图 图形可达性算法 program slicing control flow graph data dependence control dependence dependence graph
  • 相关文献

参考文献8

  • 1Weiser, M. Program slicing [J] . IEEE Transactions on Software Engineering SE - 10(4)pp. 1984, 352-357.
  • 2Harman M, Sebastian Danicic. Amorphous program slicing [J] . Fifth Intermational Workshop on Program Comprehen sion, Dearbom, Michigan, 1997.
  • 3Bergeretti J F, Carre B A. Information-flow and data analysis of while -program [J] . ACM Trans on Programming Laguages and System, 1985, (7): 37 -61.
  • 4Ouenstein K, Ottenstein L. The program dependence graph in a software development environment [J] . Proc of the ACM SIGSOFT/SIGPLAN Software Engineering Symposium on Practical Software Development Environments, 1984,177-184.
  • 5Horwitz S, Reps T, Binkley D. lnterprocedural slicing using dependence graphs [J] . ACM Trans on Programming Lan guagesand System, 1990, 12(1): 26-60.
  • 6Korel B, Laski J. Dynamic program slicing [J] . Information Processing Leuers, 1998, 29(3): 155-163.
  • 7Hausler P. Denotational program slicing [J] . In Proceedings of the 22nd Hawaii International Conference on System Sci ences, 1989, 2:486-494.
  • 8李必信,郑国梁,王云峰,李宣东.一种分析和理解程序的方法──程序切片[J].计算机研究与发展,2000,37(3):284-291. 被引量:35

二级参考文献3

共引文献34

同被引文献20

  • 1棱镜门事件[OL].http://baike.so.com/doc/5685827.html.
  • 2Christodorescu M, Jha S. Static Analysis of Executables to De- tect Malicious Patterns[C]//Proc. of the 12th USENIX Security Symp. 2003 : 169-186.
  • 3Preda M D, Christodorescu M, Jha S, et al. Semantics-Aware MaIware Detection[C]//Proc. of the 2005 IEEE Symposium on Security and Privacy(SP 2005). May 2005.
  • 4Willems C. CWSandboxx: Automatic Behaviors Analysis of Mal- ware[OL], http://www, cwsandbox, org, 2006.
  • 5Sawaya Y. Detection of attackers in services using anomalous host behavior based on traffic flow statistics[C]//11th Interna- tional Symposium on Application and Internet. 2011:353-359.
  • 6Idika N,Mathur A. A Survey of Malware Detection Techniques [R]. SERC-TR286. Software Engineering Research Center, 3-1- 07,2007:31-39.
  • 7Cohen F. Computer Viruses:Theory and Experiments[J]. Com- puters & Security, 1987,6 (1) : 22-35.
  • 8Konstantinou E. Metamorphic Virus: Analysis and Detection [R]. Technical Report RHUL-MA. 2008:33-51.
  • 9Bergeron J, Debbabi M, Desharnais J, et al. Static Detection of Malicious Code in Executable Programs[C]//Proc. of 1st Sym- posium on Requirements Engineering for Information Security. 2001:525-530.
  • 10Christodorescu M,Jha S, et al. Semantics-aware malware detec- tion[C]//Proc, of the 2005 IEEE Sym. on Security and Priva-cy. 2006 : 32-46.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部