期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于控制流的软件树生成及其应用
1
作者 何斌 《微型电脑应用》 2021年第1期121-123,共3页
软件故障树分析(SFTA)是软件可靠性与安全性分析的重要方法,在软件生命周期各阶段中有较为广泛的应用。但由于故障树分析依赖于个人经验,往往分析过程费时、费力且不能得到完整、准确的故障树图。为使软件故障树分析客观、准确、高效且... 软件故障树分析(SFTA)是软件可靠性与安全性分析的重要方法,在软件生命周期各阶段中有较为广泛的应用。但由于故障树分析依赖于个人经验,往往分析过程费时、费力且不能得到完整、准确的故障树图。为使软件故障树分析客观、准确、高效且有固定模式可依,提出了基于控制流分析结果的故障树分析方法。方法主要依赖于由工具软件自动生成的软件控制流图,按固定的转换模式进行软件故障树图的构建。最后,通过“X型烟雾报警系统”实例演绎来证明该方法的可行性。 展开更多
关键词 软件 软件故障树分析 软件控制流图 软件可靠性
下载PDF
Block-based test data adequacy measurement criteria and test complexity metrics
2
作者 陈卫东 杨建军 +1 位作者 叶澄清 潘云鹤 《Journal of Zhejiang University Science》 CSCD 2002年第1期37-41,共5页
On the basis of software testing tools we developed for programming languages, we firstly present a new control flowgraph model based on block. In view of the notion of block, we extend the traditional program\|based ... On the basis of software testing tools we developed for programming languages, we firstly present a new control flowgraph model based on block. In view of the notion of block, we extend the traditional program\|based software test data adequacy measurement criteria, and empirically analyze the subsume relation between these measurement criteria. Then, we define four test complexity metrics based on block. They are J\|complexity 0; J\|complexity 1; J\|complexity \{1+\}; J\|complexity 2. Finally, we show the Kiviat diagram that makes software quality visible. 展开更多
关键词 block NODE SEGMENT control flowgraph model test data adequacy measurement criteria test complexity metric Kiviat diagram
下载PDF
Research of Software Complexity Metrics with Security Indicator
3
作者 付剑晶 王珂 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期460-464,共5页
Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security o... Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security of the protected software. However, there are some researchers evaluating the security of the proposed protect techniques directly by the traditional complexity metrics, which is not suffident. In order to better reflect security from software complexity, a multi-factor complexity metric based on control flow graph (CFG) is proposed, and the corresponding calculating procedures are presented in detail. Moreover, complexity density models are constructed to indicate the strength of software resisting reverse engineering and code analysis. Instance analysis shows that the proposed method is simple and practical, and can more objectively reflect software security from the perspective of the complexity. 展开更多
关键词 complexity metric software protection complexity density control flow graph
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部