期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
An Empirical Application of User-Guided Program Analysis
1
作者 Wang Jigang Cheng Shengyu +1 位作者 Cao Jicheng He Meihua 《China Communications》 SCIE CSCD 2024年第7期325-333,共9页
Although static program analysis methods are frequently employed to enhance software quality,their efficiency in commercial settings is limited by their high false positive rate.The EUGENE tool can effectively lower t... Although static program analysis methods are frequently employed to enhance software quality,their efficiency in commercial settings is limited by their high false positive rate.The EUGENE tool can effectively lower the false positive rate.However,in continuous integration(CI)environments,the code is always changing,and user feedback from one version of the software cannot be applied to a subsequent version.Additionally,people find it difficult to distinguish between true positives and false positives in the analytical output.In this study,we developed the EUGENE-CI technique to address the CI problem and the EUGENE-rank lightweight heuristic algorithm to rate the reports of the analysis output in accordance with the likelihood that they are true positives.On the three projects ethereum,go-cloud,and kubernetes,we assessed our methodologies.According to the trial findings,EUGENE-CI may drastically reduce false positives while EUGENE-rank can make it much easier for users to identify the real positives among a vast number of reports.We paired our techniques with GoInsight~1 and discovered a vulnerability.We also offered a patch to the community. 展开更多
关键词 continuous integration report ranking static program analysis
下载PDF
Defeating constraint based program analysis with temporal correlation function
2
作者 安靖 Fan Wenqing Yang Yixian 《High Technology Letters》 EI CAS 2013年第3期332-337,共6页
Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlat... Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlation function can be applied to resist against both static and dynamic function summary and eoncolie testing. What' s more, the temporal correlation function can produce different outputs even with same input. This feature can be used to damage the premise of function summary as well as prevent concolie testing process to run the new branch with new input. Experiment results show that this method can reduce efficiency and path coverage of concolic testing, while greatly in- creasing the difficulty of constraint based program analysis. 展开更多
关键词 program analysis symbolic execution satisfiability problem constraint solving
下载PDF
Statistical Approach to Basketball Players’Skill Level
3
作者 Jiajun Wu 《Journal of Applied Mathematics and Physics》 2024年第4期1352-1363,共12页
In basketball, each player’s skill level is the key to a team’s success or failure, the skill level is affected by many personal and environmental factors. A physics-informed AI statistics has become extremely impor... In basketball, each player’s skill level is the key to a team’s success or failure, the skill level is affected by many personal and environmental factors. A physics-informed AI statistics has become extremely important. In this article, a complex non-linear process is considered by taking into account the average points per game of each player, playing time, shooting percentage, and others. This physics-informed statistics is to construct a multiple linear regression model with physics-informed neural networks. Based on the official data provided by the American Basketball League, and combined with specific methods of R program analysis, the regression model affecting the player’s average points per game is verified, and the key factors affecting the player’s average points per game are finally elucidated. The paper provides a novel window for coaches to make meaningful in-game adjustments to team members. 展开更多
关键词 Physics-Informed Statistics Multiple Linear Regression Average Score per Game R program analysis
下载PDF
PROGRAM SLICING BASED ON INTERESTING INDEX 被引量:2
4
作者 WuFangjun YiTong 《Journal of Electronics(China)》 2004年第3期255-260,共6页
With the scale of programs becoming increasingly bigger, and the complexity degree higher, how to select program fragments for slicing has become an important research topic. A new type of criterion called interesting... With the scale of programs becoming increasingly bigger, and the complexity degree higher, how to select program fragments for slicing has become an important research topic. A new type of criterion called interesting index is proposed for selecting parts of procedures or procedure fragments to do program slicing. This new criterion considers not only the subjective aspects in users, namely users' emphasis on the time efficiency, storage capacity or readability, but also the objective aspect in large procedures. It also represents the benefit of the users, while displaying the many-faceted roles that program slicing plays. In this way users call proceed with program slicing to large systems or unfinished systems. 展开更多
关键词 program analysis program slicing Relative complexity of types Interesting slicing
下载PDF
A HYBRID DYNAMIC PROGRAM SLICING
5
作者 YiTong WuFangjun 《Journal of Electronics(China)》 2005年第2期197-200,共4页
This letter proposes a hybrid method for computing dynamic program slicing. The key element is to construct a Coverage-Testing-based Dynamic Dependence Graph (CTDDG),which makes use of both dynamic and static informat... This letter proposes a hybrid method for computing dynamic program slicing. The key element is to construct a Coverage-Testing-based Dynamic Dependence Graph (CTDDG),which makes use of both dynamic and static information to get execution status. The approach overcomes the limitations of previous dynamic slicing methods, which have to redo slicing if slice criterion changes. 展开更多
关键词 program analysis program slicing Dynamic slicing Software testing
下载PDF
A Generic Graph Model for WCET Analysis of Multi-Core Concurrent Applications
6
作者 Robert Mittermayr Johann Blieberger 《Journal of Software Engineering and Applications》 2016年第5期182-198,共17页
Worst-case execution time (WCET) analysis of multi-threaded software is still a challenge. This comes mainly from the fact that synchronization has to be taken into account. In this paper, we focus on this issue and o... Worst-case execution time (WCET) analysis of multi-threaded software is still a challenge. This comes mainly from the fact that synchronization has to be taken into account. In this paper, we focus on this issue and on automatically calculating and incorporating stalling times (e.g. caused by lock contention) in a generic graph model. The idea that thread interleavings can be studied with a matrix calculus is novel in this research area. Our sparse matrix representations of the program are manipulated using an extended Kronecker algebra. The resulting graph represents multi-threaded programs similar as CFGs do for sequential programs. With this graph model, we are able to calculate the WCET of multi-threaded concurrent programs including stalling times which are due to synchronization. We employ a generating function-based approach for setting up data flow equations which are solved by well-known elimination-based dataflow analysis methods or an off-the-shelf equation solver. The WCET of multi-threaded programs can finally be calculated with a non-linear function solver. 展开更多
关键词 Worst-Case Execution Time analysis program analysis CONCURRENCY Multi-Threaded programs Kronecker Algebra
下载PDF
Tail-Bound Cost Analysis over Nondeterministic Probabilistic Programs
7
作者 王培新 《Journal of Shanghai Jiaotong university(Science)》 EI 2023年第6期772-782,共11页
For probabilistic programs,there is some work for qualitative and quantitative analysis about expec-tation or mean,such as expected termination time,and expected cost analysis.However,another non-trivial issue is abou... For probabilistic programs,there is some work for qualitative and quantitative analysis about expec-tation or mean,such as expected termination time,and expected cost analysis.However,another non-trivial issue is about tail bounds(i.e.,upper bounds of tail probabilities),which can provide high-probability guarantees to extreme events.In this work,we focus on the problem of tail-bound cost analysis over nondeterministic proba-bilistic programs,which aims to automatically obtain the tail bound of resource usages over such programs.To achieve this goal,we present a novel approach,combined with a suitable concentration inequality,to derive the tail bound of accumulated cost until program termination.Our approach can handle both positive and negative costs.Moreover,our approach enables an automated template-based synthesis of supermartingales and leads to an efficient polynomial-time algorithm.To show the effectiveness of our approach,we present experimental results on various programs and make a comparison with state-of-the-art tools. 展开更多
关键词 program cost analysis probabilistic programs tail bound MARTINGALES
原文传递
System Dependence Graph Construction for Aspect Oriented C++
8
作者 SHI Liang XU Baowen 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期555-560,共6页
This paper proposes an extended system dependence graph called AspectSDG to represent control and data dependences for AspeetC++ programs, and presents an approach for the construction of AspectSDG. This approach de... This paper proposes an extended system dependence graph called AspectSDG to represent control and data dependences for AspeetC++ programs, and presents an approach for the construction of AspectSDG. This approach decomposes aspect-oriented programs into three parts: component codes, aspect codes, and weaving codes. It constructs program dependence graphs (PDGs) for each part, and then connects the PDGs at call sites to form the complete AspectSDG. The AspectSDG can deal with advice precedence correctly, and represent the additional dependences caused by aspect codes. Based on this model, we introduce how to compute a static slice of an AspectC+ + program. 展开更多
关键词 program analysis system dependence graph ASPECT-ORIENTED slicing
下载PDF
MFV-Class: a multi-faceted visualization tool of object classes
9
作者 张志猛 潘云鹤 庄越挺 《Journal of Zhejiang University Science》 EI CSCD 2004年第11期1374-1381,共8页
Classes are key software components in an object-oriented software system. In many industrial OO software systems, there are some classes that have complicated structure and relationships. So in the processes of softw... Classes are key software components in an object-oriented software system. In many industrial OO software systems, there are some classes that have complicated structure and relationships. So in the processes of software maintenance, testing, software reengineering, software reuse and software restructure, it is a challenge for software engineers to understand these classes thoroughly. This paper proposes a class comprehension model based on constructivist learning theory, and implements a software visualization tool (MFV-Class) to help in the comprehension of a class. The tool provides multiple views of class to uncover manifold facets of class contents. It enables visualizing three object-oriented metrics of classes to help users focus on the understanding process. A case study was conducted to evaluate our approach and the toolkit. 展开更多
关键词 program comprehension Reverse engineering Software visualization Object-oriented software metrics program analysis
下载PDF
An Algorithm of Programming Data Flow Analysis Based on Data Flow Expression
10
作者 Zhao Dongfan, Li Wei and Meng Qingkai (Department of Computer Engineering, Changchun Institute of Post and Telecommunication, Changchun 130012, P. R. China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1998年第1期41-42,共2页
This paper states the basic principle of program data flow analysis in a formal way and gives the concept of data flow expression. On the basis of this concept, an algorithm of finding data flow exceptions is rendered... This paper states the basic principle of program data flow analysis in a formal way and gives the concept of data flow expression. On the basis of this concept, an algorithm of finding data flow exceptions is rendered. This algorithm has great generality, with which it is easy to develop a tool for program test. So it is practical in application. 展开更多
关键词 software test program analysis data flow analysis data flow expression
原文传递
Automatic discovery of stateful variables in network protocol software based on replay analysis
11
作者 Jianxin HUANG Bo YU +1 位作者 Runhao LIU Jinshu SU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第3期403-416,共14页
Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states ... Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states and store some information about the sessions are prone to potentialflaws caused by violations of protocol specification requirements and program logic.Discovering such variables is significant in discovering and exploiting vulnerabilities in protocol software,and still needs massive manual verifications.In this paper,we propose a novel method that could automatically discover the use of stateful variables in network protocol software.The core idea is that a stateful variable features information of the communication entities and the software states,so it will exist in the form of a global or static variable during program execution.Based on recording and replaying a protocol program’s execution,varieties of variables in the life cycle can be tracked with the technique of dynamic instrument.We draw up some rules from multiple dimensions by taking full advantage of the existing vulnerability knowledge to determine whether the data stored in critical memory areas have stateful characteristics.We also implement a prototype system that can discover stateful variables automatically and then perform it on nine programs in Pro FuzzBench and two complex real-world software programs.With the help of available open-source code,the evaluation results show that the average true positive rate(TPR)can reach 82%and the average precision can be approximately up to 96%. 展开更多
关键词 Stateful variables Network protocol software program analysis technology Network security
原文传递
Model and algorithm of optimizing alternate traffic restriction scheme in urban traffic network 被引量:1
12
作者 徐光明 史峰 +1 位作者 刘冰 黄合来 《Journal of Central South University》 SCIE EI CAS 2014年第12期4742-4752,共11页
An optimization model and its solution algorithm for alternate traffic restriction(ATR) schemes were introduced in terms of both the restriction districts and the proportion of restricted automobiles. A bi-level progr... An optimization model and its solution algorithm for alternate traffic restriction(ATR) schemes were introduced in terms of both the restriction districts and the proportion of restricted automobiles. A bi-level programming model was proposed to model the ATR scheme optimization problem by aiming at consumer surplus maximization and overload flow minimization at the upper-level model. At the lower-level model, elastic demand, mode choice and multi-class user equilibrium assignment were synthetically optimized. A genetic algorithm involving prolonging codes was constructed, demonstrating high computing efficiency in that it dynamically includes newly-appearing overload links in the codes so as to reduce the subsequent searching range. Moreover,practical processing approaches were suggested, which may improve the operability of the model-based solutions. 展开更多
关键词 urban traffic congestion alternate traffic restriction equilibrium analysis bi-level programming model
下载PDF
Quantitative Evaluation of Neuroplastic Biomaterial for Human Brain Rehabilitation to Stroke Subjects
13
作者 Chiyuri Nagayama 《Journal of Chemistry and Chemical Engineering》 2013年第11期1036-1043,共8页
Neurorehabilitation involves training of brain activity, which influences the resistive torque and electromyogram. This quantitative evaluation is numerical modeling of biomaterial of human body. Measurement for rehab... Neurorehabilitation involves training of brain activity, which influences the resistive torque and electromyogram. This quantitative evaluation is numerical modeling of biomaterial of human body. Measurement for rehabilitation and developing numerical modeling in patients are useful for information technology education with healthcare background. The resistive torque and electromyogram were measured. Electromyogram is the neuronal activity from eight lower limb muscles. Both activities are output signals for angle input signals. The resistive torque of a stroke patient shows a hysteresis curve, and this is a velocity-dependent component, particular for stroke. Differentiated angle by muscle spindle, a velocity-dependent component, is a stretch reflex (spasticity). In an electromyogram of a stroke patient, SLR (stretch reflex via spinal cord) means a short latency reflex, and LLR (stretch reflex via cerebral cortex) means a long latency reflex. An example of some stroke electromyogram shows long latency reflex, and this is voluntary movement during the experiment. The example of some stroke resistive torque reveals that viscoelasticity is used for the intrinsic component. The example of some stroke electromyogram reveals that long latency reflex is used for the reflex component of lower limbs. Current research needs improvement. Intrinsic viscoelasticity is modeled by a second-order differential equation. The reflex component of stroke patients is modeled by a double exponential function. Open source software is in use. Information technology-based analyses by numerical modeling would be applied in future healthcare education. 展开更多
关键词 analysis programming biological tissue educational effect developmental process.
下载PDF
XBASE数据应用程序源代码分析
14
作者 王杰 王锡钢 王晓东 《鞍山钢铁学院学报》 1996年第4期33-36,共4页
讨论了XBASE命令文件和库文件结构,提出了分析命令文件的方法和相关库的概念,介绍了分析系统的建立和应用情况。
关键词 应用程序 数据库 系统分析 源代码
下载PDF
Automated String Constraints Solving for Programs Containing String Manipulation Functions 被引量:1
15
作者 Xu-Zhou Zhang Yun-Zhan Gong +2 位作者 Ya-Wen Wang Ying Xing Ming-Zhe Zhang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第6期1125-1135,共11页
The ability to solve various constraints is a principal factor of automatic constraint solvers. Most object-oriented languages treat a character string as a primitive data type which is manipulated by string library f... The ability to solve various constraints is a principal factor of automatic constraint solvers. Most object-oriented languages treat a character string as a primitive data type which is manipulated by string library functions. Most constraint solvers have limitations on their input constraints, such as strong restrictions on the expressiveness of constraints or lack of the ability to solve hybrid constraints. These limitations hinder applying automated constraint solvers on program analysis techniques for programs containing strings and string manipulation functions. We propose an approach to automatically solve program constraints involving strings and string manipulation functions. Based on the character array model, we design a constraint language which contains primitive operations to precisely describe the constraints of commonly used string manipulation functions. The translated string constraints together with numeric constraints are then solved by a two- phase test generation procedure: firstly, a partial solution is obtained to satisfy the arithmetic constraints of the position variables, and the solution is utilized to simplify the string constraints into pure character array constraints; secondly, the pure array constraints are solved by an off-the-shelf array-specific theory based constraint solver. We integrate the approach into an automated testing tool to support the generation of string test cases, and then perform experiments. The results of the experiments prove that the integration of the proposed approach promotes the testing coverage of the existing testing tool, and the integrated tool has an advantage of handling specific string manipulation functions compared with an existing string solver. 展开更多
关键词 string constraints solving satisfaction module theory program analysis software testing automated testinput generation
原文传递
Bin2vec:learning representations of binary executable programs for security tasks 被引量:1
16
作者 Shushan Arakelyan Sima Arasteh +2 位作者 Christophe Hauser Erik Kline Aram Galstyan 《Cybersecurity》 EI CSCD 2021年第1期401-414,共14页
Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics,a tedious and time consuming task for human analysts.In order to improve automation and scalability,we propose... Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics,a tedious and time consuming task for human analysts.In order to improve automation and scalability,we propose an alternative direction based on distributed representations of binary programs with applicability to a number of downstream tasks.We introduce Bin2vec,a new approach leveraging Graph Convolutional Networks(GCN)along with computational program graphs in order to learn a high dimensional representation of binary executable programs.We demonstrate the versatility of this approach by using our representations to solve two semantically different binary analysis tasks–functional algorithm classification and vulnerability discovery.We compare the proposed approach to our own strong baseline as well as published results,and demonstrate improvement over state-of-the-art methods for both tasks.We evaluated Bin2vec on 49191 binaries for the functional algorithm classification task,and on 30 different CWE-IDs including at least 100 CVE entries each for the vulnerability discovery task.We set a new state-of-the-art result by reducing the classification error by 40%compared to the source-code based inst2vec approach,while working on binary code.For almost every vulnerability class in our dataset,our prediction accuracy is over 80%(and over 90%in multiple classes). 展开更多
关键词 Binary program analysis Computer security Vulnerability discovery Neural networks
原文传递
AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel
17
作者 Ying-Jie Wang Liang-Ze Yin Wei Dong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2021年第6期1325-1341,共17页
The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe conditions.If a security-sensitive operation is unchecked,a missing-check issue arise... The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe conditions.If a security-sensitive operation is unchecked,a missing-check issue arises.Missing check is a class of severe bugs in software programs especially in operating system kernels,which may cause a variety of security issues,such as out-of-bound accesses,permission bypasses,and privilege escalations.Due to the lack of security specifications,how to automatically identify security-sensitive operations and their required security checks in the Linux kernel becomes a challenge for missing-check analysis.In this paper,we present an accurate missing-check analysis method for Linux kernel,which can automatically infer possible security-sensitive operations.Particularly,we first automatically identify all possible security check functions of Linux.Then according to their callsites,a two-direction analysis method is leveraged to identify possible security-sensitive operations.A missing-check bug is reported when the security-sensitive operation is not protected by its corresponding security check.We have implemented our method as a tool,named AMCheX,on top of the LLVM(Low Level Virtual Machine)framework and evaluated it on the Linux kernel.AMCheX reported 12 new missing-check bugs which can cause security issues.Five of them have been confirmed by Linux maintainers. 展开更多
关键词 security check function security-sensitive operation program analysis missing-check
原文传递
Slicing Java Generic Programs Using Generic System Dependence Graph
18
作者 CHEN Lin1,2,XU Baowen1,2 1.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,Jiangsu China 2.Department of Computer Science and Technology,Nanjing University,Nanjing 210093,Jiangsu China 《Wuhan University Journal of Natural Sciences》 CAS 2009年第4期304-308,共5页
The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for ... The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for Java generic programs based on the traditional system dependence graph to express dependences for parameterized type information. A novel slicing criterion and slicing algorithm for generic programs is proposed. The slices computed by the algorithm can help to understand relations between concepts and types for generic programs and can express the features of generic programs better. 展开更多
关键词 SLICING system dependence graph GENERICS program analysis
原文传递
An Action Analysis for Combining Partial Evaluation
19
作者 廖湖声 《Journal of Computer Science & Technology》 SCIE EI CSCD 2000年第2期196-200,F003,共6页
This paper proposes an action analysis for implementing combining partial evaluation efficiently. By analyzing the results of binding time analysis, on erations, which should be used in the combining partial evaluatio... This paper proposes an action analysis for implementing combining partial evaluation efficiently. By analyzing the results of binding time analysis, on erations, which should be used in the combining partial evaluation, are determined in advance, so that the computation in the combination of specialized programs is reduced effectively. 展开更多
关键词 partial evaluation program static analysis binding time analysis
原文传递
Fine-Tuning Pre-Trained CodeBERT for Code Search in Smart Contract
20
作者 JIN Huan LI Qinying 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第3期237-245,共9页
Smart contracts,which automatically execute on decentralized platforms like Ethereum,require high security and low gas consumption.As a result,developers have a strong demand for semantic code search tools that utiliz... Smart contracts,which automatically execute on decentralized platforms like Ethereum,require high security and low gas consumption.As a result,developers have a strong demand for semantic code search tools that utilize natural language queries to efficiently search for existing code snippets.However,existing code search models face a semantic gap between code and queries,which requires a large amount of training data.In this paper,we propose a fine-tuning approach to bridge the semantic gap in code search and improve the search accuracy.We collect 80723 different pairs of<comment,code snippet>from Etherscan.io and use these pairs to fine-tune,validate,and test the pre-trained CodeBERT model.Using the fine-tuned model,we develop a code search engine specifically for smart contracts.We evaluate the Recall@k and Mean Reciprocal Rank(MRR)of the fine-tuned CodeBERT model using different proportions of the finetuned data.It is encouraging that even a small amount of fine-tuned data can produce satisfactory results.In addition,we perform a comparative analysis between the fine-tuned CodeBERT model and the two state-of-the-art models.The experimental results show that the finetuned CodeBERT model has superior performance in terms of Recall@k and MRR.These findings highlight the effectiveness of our finetuning approach and its potential to significantly improve the code search accuracy. 展开更多
关键词 code search smart contract pre-trained code models program analysis machine learning
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部