期刊文献+

基于缺陷模式匹配的静态源码分析技术研究 被引量:2

Research on Static Source Analysis Technology Based on Defect Pattern Matching
下载PDF
导出
摘要 随着信息技术的飞速发展,应用软件的规模不断扩大,越来越多的软件安全问题频频出现,因此如何保证和提高软件质量日益成为一个备受关注的问题。研究表明,在测试阶段修正错误所付出的成本比代码编写阶段多出10倍,因此以静态分析的方式来检测软件质量能大大降低投入成本。基于缺陷模式的软件测试是近些年发展起来的一种程序源代码静态分析技术,主要用于自动或者半自动的软件缺陷检测及预防,此类缺陷检测工具由于效率高和使用简单等特点在高可信软件测试中得到了广泛应用。所谓的缺陷模式,是指程序中经常发生的错误或缺陷所呈现出的特定规律。缺陷模式通常由具有领域程序设计经验的人或者测试人员总结出来。本文通过利用开源软件为实验工具,运用静态分析的相关理论,自定义检测器对软件项目做测试得出了一些存在的问题。 With the rapid development of information technology, the application software continues to expand the scale of software security issues more and more frequent, so how to guarantee and improve the quality of software has become a problem of concern. Research shows that the cost of correcting errors in the testing phase is 10 times more than that of the code, so the quality of the software can be greatly reduced by static analysis. Software testing based on defect pattern is a technique developed in recent years, the source code static analysis, mainly for software defect detection and prevention automatically or semi automatically, this kind of defect detection tool due to the characteristics of high efficiency and simple to use, has been widely used in software testing. The so-called defect mode, is refers to the procedure often occurs the mistake or the flaw place presents the specific rule. Defect modes are often summed up by people or testers who are experienced in the field of program design. In this paper, the use of open source software as an experimental tool, the use of static analysis of the relevant theory, the definition of the software test software project to do some of the existing problems.
出处 《软件》 2016年第11期146-149,共4页 Software
关键词 软件测试 静态代码 缺陷模式 检测器 Software testing Static code Defect pattern Detector
  • 相关文献

参考文献3

二级参考文献11

  • 1夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 2ZHANG Xiao Lan,EDWARDS A.Using CQUAL for static analysis of authorization hook [ C ]. Usenix security symposium, USA, 2002.
  • 3JOHNSON R, WAGNER D.Finding user/kernel pointer bugs with type inference[C].Usenix security symposium,2004.
  • 4XIE Yi Chen,CHOU A,ARCHER E D.Using symbolic pathsensitive analysis to detect memory access errors[C].ESEC/FSE ' 03, helsinki, finland, Sep 2003.
  • 5白哥乐,宫云战,杨朝红.基于源码分析的软件安全测试工具综述[C].第五届中国测试学术会议,2008.
  • 6Weber S, Karger P A, Paradkar A. A Software Flaw Taxonomy: Aiming Tools at Security[C]//Proc. of ACM Software Engineering for Secure Systems Building Trustworthy Applications. Louis, Missouri, USA: [s. n.], 2005.
  • 7Landwehr C E. Formal Models for Computer Security[J]. ACM Computing Surveys, 1981, 13(3): 247-278.
  • 8Foster J S, Fghndrich M, Aiken A. A Theory of Type Qualifiers[J]. ACM SIGPLAN Notices, 1999, 34(5): 192-203.
  • 9Kurshan R P. Program Verification[J]. Notices of the American Mathematical Society, 2000, 47(5): 534-545.
  • 10Wagner D. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C]//Proc. of the 7th Network and Distributed System Security Symposium. San Diego, USA,: [S. l.], 2000.

共引文献53

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部