CN102222035A - Software behavior detection system based on symbolic execution technology and detection method thereof - Google Patents
Software behavior detection system based on symbolic execution technology and detection method thereof Download PDFInfo
- Publication number
- CN102222035A CN102222035A CN2011102095144A CN201110209514A CN102222035A CN 102222035 A CN102222035 A CN 102222035A CN 2011102095144 A CN2011102095144 A CN 2011102095144A CN 201110209514 A CN201110209514 A CN 201110209514A CN 102222035 A CN102222035 A CN 102222035A
- Authority
- CN
- China
- Prior art keywords
- module
- constraint
- constraint condition
- executable program
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a software behavior detection system based on symbolic execution technology and a detection method thereof, wherein the detection system consists of a constraint generation module, a constraint negation/optimization module, a constraint solution module, a binary code pile pitching module and a behavior monitor module; and the method specifically comprises the following steps of: monitoring software behavior in the actual execution process of a program, collecting information relevant to the behavior, and providing certain essential data for behavior analysis; and simultaneously, collecting the constraint condition of the current path; after the program execution is finished, negating a certain constraint condition in the set of collected path constraint conditions so as to acquire a new patch constraint set, and solving the newly generated new patch constraint set by using a solver so as to determine whether a path can be achieved; and if the preconditions traversing the patch can be met, triggering a new software behavior by traversing the path. The system and the method can efficiently improve the precision and comprehensiveness of behavior detection.
Description
Technical field
The present invention relates to the software action analytical technology, be specifically related to a kind of software action detection system and based on the detection method of this system.
Background technology
The software action analysis is to be object with software, is undertaken manually or automatically analyzing by static state or dynamic method, to verify, confirm, to monitor or find the process and the activity of software character, finds the behavior and the function of software.Say that intuitively the purpose of software action analysis is understood software exactly and what has been done in operating system, perhaps what can be done.Software action detects and to be meant the behavior that detects software, collects the information relevant with behavior, and the live telecast that provides software systems to move is for software action analysis and prediction provide basic data, so that system is carried out the software action analysis.
The software action detection technique is according to obtaining the approach difference of information, is divided into static information and obtains with multidate information and obtain.Static information obtains the software action information of obtaining statically that is meant from program.Static state obtain have the coverage rate height, fireballing advantage, but have certain wrong report, and can't analyze the program that adopts the obfuscated codes technology; Multidate information obtains and is meant in the program implementation process, and the running status by prize procedure obtains program information.Dynamic information is captured in real time, and performed instruction all is effectively, triggers opportunity but dynamic analysing method depends on software action, in the software action context of detection, has hysteresis quality and characteristics such as consuming time.
Summary of the invention
The present invention is directed to the existing existing deficiency of software action detection technique, technical matters to be solved comprises two aspects: first aspect provides a kind of software action detection system based on the symbol execution technique, and second invention provides corresponding detecting method.
For solving technique scheme, the technical solution used in the present invention is as follows:
Based on the software action detection system of symbol execution technique, described detection system comprises constraint generation module, constraint negate/optimal module, constraint solving module, binary code pitching pile module, behavior monitoring module;
Described scale-of-two pitching pile module is inserted into detection of code in the executable program, obtaining executable program multidate information in the process of implementation, and testing result is fed back to the constraint generation module;
Described constraint generation module generates character expression and constraint condition in the executable program implementation, form corresponding constraint condition set;
Described behavior monitoring module is monitored in real time to software action in the executable program implementation;
Described constraint negate/optimal module is after executable program is finished, certain constraint condition negate that the constraint condition collected is concentrated also is optimized constraint condition set, produce new constraint condition set, but the described new corresponding new execution route of constraint condition set;
Described constraint solving module is found the solution new constraint condition set, and it separates corresponding new input, but and the new path of driving program execution.
Further, described constraint generation module comprises register expression formula module, memory address expression formula module, constraint condition expression formula module, described register is expressed the formula module, when the destination operand of the current execution command of executable program is register, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate register and express formula; Described memory address expression formula module, when the current execution command destination operand of executable program is memory address, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate the memory address expression formula; Described constraint condition expression formula module, when the current execution command of executable program is branch's jump instruction, according to the instruction type of the current execution command of binary code pitching pile module acquisition executable program, information such as instruction operands generate the constraint condition expression formula.
Further, described constraint solving module is found the solution the constraint condition set that meets its syntax rule by constraint solving instrument STP, produces the new set of separating, and this set can be used as the input boot of executable program and carries out new path.
Further, described constraint negate/optimal module is according to routing strategy certain constraint condition in the current path constraint condition set to be carried out negate, the purpose of optimizing is to reduce the constraint condition number of generation, thereby reduces the query requests to constraint solver, improves analysis efficiency.
Further again, described scale-of-two pitching pile module, the plug-in mounting mechanism of using code instrumentation instrument DynamoRIO to provide, dynamically be inserted into monitoring code in the executable program, the monitoring code that inserts is for the execution state information in the real-time acquisition executable program implementation, as the return results after the executable program calling system API etc.; Some interfaces that provide according to DynamoRIO can interception system API, finishes the monitoring task to calling system API in the executable program.According to some interfaces that DynamoRIO provides, can obtain the register value of current executable program, PC value, the multidate information when some in the executable program implementations such as instruction opcode value are moved.
Further again, described behavior monitoring module is that the software action that triggers in the executable program implementation is monitored in real time, obtains the information relevant with behavior, for the software action analysis provides basic data; The a series of program statements or the system call of described software action respective specific function are exactly that the real-time follow-up monitoring is carried out in a series of program statements or the system call of respective specific function to the monitoring of software action.
Based on the software action detection method of symbol execution technique, described detection method comprises the steps:
(1) be written into executable program and start after, by binary code pitching pile module monitoring code is inserted in the target program, obtain target program multidate information in the process of implementation, provide the live telecast of system's operation, for behavioural analysis provides basic data;
(2) after executable program started, the behavior monitoring module was monitored in real time to software action, and the collection information relevant with behavior;
(3) in the executable program implementation, every instruction carrying out in the constraint generation module identification executable program implementation, and according to information such as the instruction type of this instruction, instruction operands, generate corresponding character expression, if run into branch's redirect statement, then generate the constraint condition expression formula, form corresponding constraint condition set;
(4) after program is finished, constraint negate/optimal module is concentrated certain constraint condition expression formula negate according to routing strategy to the constraint condition of collecting, and produces new constraint condition set, but the corresponding new execution route of this constraint condition set;
(5) the constraint solving module is found the solution the path constraint condition set of new generation, produces a new test case, and this test case is carried out according to new path as the input driver of program;
(6) execution in step (1) is to (5) repeatedly, and the reachable path in the traversal program is finished the behavior detection to software.
The present invention mainly is the behavior detection at binary executable, improved accuracy rate that behavior detects and comprehensive, and adopted the symbol execution technique, the advantage of combined symbol execution technique, the dynamic reachable path in the traversal program, possible software action in the trigger, improve comprehensive that software action detects, in the practical implementation of program, software action is monitored, improved the accuracy that software action detects.
The present invention is used in the symbol execution technique in the software action detection, obtains higher Program path coverage rate, makes testing result more complete.Use dynamic monitoring method, strengthened the accuracy and the cogency of testing result greatly.
Description of drawings
Further specify the present invention below in conjunction with the drawings and specific embodiments.
Fig. 1 is the block diagram of detection system among the present invention.
Embodiment
For technological means, creation characteristic that the present invention is realized, reach purpose and effect is easy to understand, below in conjunction with concrete diagram, further set forth the present invention.
The present invention utilizes the symbol execution technique to convert program to character expression, the path constraint condition of collection procedure in the program implementation process, after program is finished, according to routing strategy, certain constraint condition negate in the current path constraint condition set produces new constraint condition set, and with constraint solver it is found the solution, obtain one and separate set, this set can boot be carried out new path.Carry out the reachable path of this step in can traversal program repeatedly.
Based on above-mentioned principle, concrete enforcement of the present invention is as follows:
Referring to Fig. 1, the software action detection system 100 based on the symbol execution technique provided by the invention comprises constraint generation module 103, constraint negate/optimal module 104, constraint solving module 105, binary code pitching pile module 101, behavior monitoring module 102.
Wherein, scale-of-two pitching pile module 101 is inserted into detection of code in the executable program, in the program implementation process, obtains executable program multidate information in the process of implementation, and testing result fed back to the constraint generation module, as the foundation that generates the constraint expression formula.
This scale-of-two pitching pile module, the plug-in mounting mechanism of using code instrumentation instrument DynamoRIO to provide, dynamically be inserted into monitoring code in the executable program, the monitoring code that inserts is for the execution state information in the real-time acquisition executable program implementation, as the return results after the invokes system API etc.; Some interfaces that provide according to DynamoRIO can interception system API, finishes the monitoring task to calling system API in the executable program.According to some interfaces that DynamoRIO provides, can obtain the register value of current executable program, PC value, the multidate information when some in the executable program implementations such as instruction opcode value are moved.
For this reason, constraint generation module 103 comprises register expression formula module, memory address expression formula module, constraint condition expression formula module.
Register is expressed the formula module, if when the destination operand of the current execution command of program is register, and the instruction type of the current execution command of program that obtains according to binary code pitching pile module, information such as instruction operands generate register and express formula.
When if the current execution command destination operand of memory address expression formula module program is memory address, the instruction type of the current execution command of program that obtains according to binary code pitching pile module, information such as instruction operands generate the memory address expression formula
Constraint condition expression formula module when if the current execution command of program is branch's jump instruction, obtains the instruction type of the current execution command of program according to binary code pitching pile module, and information such as instruction operands generate the constraint condition expression formula.
Constraint negate/optimal module 104 is after executable program is finished, according to routing strategy certain the constraint condition expression formula in the constraint condition set of collecting (being the constraint condition expression formula collection of current path) is carried out negate, produce a new constraint condition set, new execution route in the corresponding program of this new constraint condition set.Retrain 104 pairs of current constraint condition sets of negate/optimal module (negate before constraint condition set) simultaneously and be optimized, the efficient of finding the solution with raising.The purpose of optimizing is to reduce the constraint condition number of generation, thereby reduces the query requests to constraint solver, improves analysis efficiency
105 pairs of new constraint condition sets of constraint solving module are found the solution, and it separates corresponding new input, but and the new path of driving program execution.
This constraint solving module is found the solution the constraint condition set that meets its syntax rule by constraint solving instrument STP, produces the new set of separating, and this set can be used as the input boot of executable program and carries out new path.
Based on above-mentioned detection system, its detection method comprises the steps (referring to Fig. 1):
(1) is written into binary executable (target program), behind program start, by binary code pitching pile module monitoring code is inserted in the target program, obtain target program multidate information in the process of implementation, provide the live telecast of system's operation, for behavioural analysis provides basic data;
(2) after executable program (target program) started, the behavior monitoring module was monitored in real time to software action, and the collection information relevant with behavior;
(3) in executable program (target program) implementation, every instruction carrying out in the constraint generation module recognition objective program process, and according to information such as the instruction type of this instruction, instruction operands, generate corresponding character expression, if run into branch's redirect statement, then generate the constraint condition expression formula, form corresponding constraint condition set;
(4) after program is finished, constraint negate/optimal module is according to routing strategy, and certain the constraint condition negate to the constraint condition of collecting is concentrated produces new constraint condition set, but the corresponding new execution route of this constraint condition set;
(5) the constraint solving module is found the solution the path constraint condition set of new generation, produces a new test case, and this test case is carried out according to new path as the input driver of program;
(6) execution in step (1) is to (5) repeatedly, and the reachable path in the traversal program is finished the behavior detection to software.
Based on above-mentioned detection method, the present invention at first selects an initial use-case to import as program, is used for driver and carries out according to the path of this initial use-case correspondence.
Start and executive routine, in the program implementation process, collect constraint condition, and in the program implementation process, the software action that triggers is monitored, collect the information relevant with behavior.
After program is finished, certain constraint condition that the constraint condition of collecting is concentrated is carried out negate, produce a new constraint condition set, find the solution with constraint solver the back, obtain a new test case, this test case can boot be carried out new path, carries out so repeatedly, in the program pass process of reality, reach the purpose that software action is detected.
More than show and described ultimate principle of the present invention, principal character and advantage of the present invention.The technician of the industry should understand; the present invention is not restricted to the described embodiments; that describes in the foregoing description and the instructions just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.The claimed scope of the present invention is defined by appending claims and equivalent thereof.
Claims (7)
1. based on the software action detection system of symbol execution technique, it is characterized in that described detection system comprises constraint generation module, constraint negate/optimal module, constraint solving module, binary code pitching pile module, behavior monitoring module;
Described scale-of-two pitching pile module is inserted into detection of code in the executable program, obtaining executable program multidate information in the process of implementation, and testing result is fed back to the constraint generation module;
Described constraint generation module generates character expression and constraint condition in the executable program implementation, form corresponding constraint condition set;
Described behavior monitoring module is monitored in real time to software action in the executable program implementation;
Described constraint negate/optimal module is after executable program is finished, certain constraint condition negate that the constraint condition collected is concentrated also is optimized constraint condition set, produce new constraint condition set, but the described new corresponding new execution route of constraint condition set;
Described constraint solving module is found the solution new constraint condition set, and it separates corresponding new input, but and the new path of driving program execution.
2. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described constraint generation module comprises register expression formula module, memory address expression formula module, constraint condition expression formula module, described register is expressed the formula module, when the destination operand of the current execution command of executable program is register, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate register and express formula; Described memory address expression formula module, when the current execution command destination operand of executable program is memory address, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate the memory address expression formula; Described constraint condition expression formula module, when the current execution command of executable program is branch's jump instruction, according to the instruction type of the current execution command of binary code pitching pile module acquisition executable program, information such as instruction operands generate the constraint condition expression formula.
3. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described constraint solving module is found the solution the constraint condition set that meets its syntax rule by constraint solving instrument STP, produce the new set of separating, this set can be used as the input boot of executable program and carries out new path.
4. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described constraint negate/optimal module is according to routing strategy certain constraint condition in the current path constraint condition set to be carried out negate, and is optimized.
5. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described scale-of-two pitching pile module, the plug-in mounting mechanism of using code instrumentation instrument DynamoRIO to provide, dynamically be inserted into monitoring code in the executable program, obtain execution state information in the executable program implementation in real time by the monitoring code that inserts, and the corresponding interface that provides according to DynamoRIO, can interception system API, finish monitoring task to calling system API in the executable program; And according to the corresponding interface that DynamoRIO provides, obtain the register value of current executable program, PC value, the multidate information when moving in the executable program implementations such as instruction opcode value.
6. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described behavior monitoring module is that the software action that triggers in the executable program implementation is monitored in real time, obtain the information relevant, for the software action analysis provides basic data with behavior; The a series of program statements or the system call of described software action respective specific function are exactly that the real-time follow-up monitoring is carried out in a series of program statements or the system call of respective specific function to the monitoring of software action.
7. based on the software action detection method of symbol execution technique, it is characterized in that described detection method comprises the steps:
(1) be written into executable program and start after, by binary code pitching pile module monitoring code is inserted in the target program, obtain target program multidate information in the process of implementation, provide the live telecast of system's operation, for behavioural analysis provides basic data;
(2) after executable program started, the behavior monitoring module was monitored in real time to software action, and the collection information relevant with behavior;
(3) in the executable program implementation, every instruction carrying out in the constraint generation module identification executable program implementation, and according to information such as the instruction type of this instruction, instruction operands, generate corresponding character expression, if run into branch's redirect statement, then generate the constraint condition expression formula, form corresponding constraint condition set;
(4) after program is finished, constraint negate/optimal module is concentrated certain constraint condition expression formula negate according to routing strategy to the constraint condition of collecting, and produces new constraint condition set, but the corresponding new execution route of this constraint condition set;
(5) the constraint solving module is found the solution the path constraint condition set of new generation, produces a new test case, and this test case is carried out according to new path as the input driver of program;
(6) execution in step (1) is to (5) repeatedly, and the reachable path in the traversal program is finished the behavior detection to software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102095144A CN102222035A (en) | 2011-07-25 | 2011-07-25 | Software behavior detection system based on symbolic execution technology and detection method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102095144A CN102222035A (en) | 2011-07-25 | 2011-07-25 | Software behavior detection system based on symbolic execution technology and detection method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102222035A true CN102222035A (en) | 2011-10-19 |
Family
ID=44778591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011102095144A Pending CN102222035A (en) | 2011-07-25 | 2011-07-25 | Software behavior detection system based on symbolic execution technology and detection method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102222035A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102799529A (en) * | 2012-07-13 | 2012-11-28 | 北京航空航天大学 | Generation method of dynamic binary code test case |
CN102841844A (en) * | 2012-07-13 | 2012-12-26 | 北京航空航天大学 | Method for binary code vulnerability discovery on basis of simple symbolic execution |
CN103399780A (en) * | 2013-07-03 | 2013-11-20 | 清华大学 | Integer overflow detecting method based on virtual machine technique and dynamic symbolic execution |
CN103714001A (en) * | 2013-12-23 | 2014-04-09 | 北京工业大学 | Method for analyzing cooperative behaviors between components in software component system |
CN104503901A (en) * | 2014-12-04 | 2015-04-08 | 中国人民解放军总参谋部第五十四研究所 | Guiding symbol execution method based on static path analysis |
CN105760219A (en) * | 2016-01-29 | 2016-07-13 | 中国人民解放军信息工程大学 | Parallel symbol execution system based on multi-Agent distributed scheduling |
CN107239317A (en) * | 2017-06-07 | 2017-10-10 | 成都四象联创科技有限公司 | Executable program program optimization method |
CN107358106A (en) * | 2017-07-11 | 2017-11-17 | 北京奇虎科技有限公司 | Leak detection method, Hole Detection device and server |
CN107885663A (en) * | 2017-11-29 | 2018-04-06 | 中国电子产品可靠性与环境试验研究所 | Method, apparatus, computer equipment and the storage medium of automatic generating test case |
CN108228187A (en) * | 2018-01-02 | 2018-06-29 | 南京大学 | A kind of global optimization method of mathematical program |
CN108845944A (en) * | 2018-06-28 | 2018-11-20 | 中国人民解放军国防科技大学 | Method for improving software fuzz testing efficiency by combining symbolic execution |
CN109426722A (en) * | 2017-09-01 | 2019-03-05 | 深圳市源伞新科技有限公司 | SQL injection defect inspection method, system, equipment and storage medium |
CN109992968A (en) * | 2019-03-25 | 2019-07-09 | 北京理工大学 | Android malicious act dynamic testing method based on binary system dynamic pitching pile |
CN111367786A (en) * | 2018-12-26 | 2020-07-03 | 华为技术有限公司 | Symbol execution method, electronic equipment and storage medium |
CN116361182A (en) * | 2023-04-03 | 2023-06-30 | 南京航空航天大学 | Symbol execution method for error state guidance |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040107409A1 (en) * | 2002-12-03 | 2004-06-03 | Melham Thomas F. | Automatic symbolic indexing methods for formal verification on a symbolic lattice domain |
CN101714119A (en) * | 2009-12-09 | 2010-05-26 | 北京邮电大学 | Test data generating device and method based on binary program |
CN101968766A (en) * | 2010-10-21 | 2011-02-09 | 上海交通大学 | System for detecting software bug triggered during practical running of computer program |
CN102012987A (en) * | 2010-12-02 | 2011-04-13 | 李清宝 | Automatic behavioural analysis system for binary malicious codes |
-
2011
- 2011-07-25 CN CN2011102095144A patent/CN102222035A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040107409A1 (en) * | 2002-12-03 | 2004-06-03 | Melham Thomas F. | Automatic symbolic indexing methods for formal verification on a symbolic lattice domain |
CN101714119A (en) * | 2009-12-09 | 2010-05-26 | 北京邮电大学 | Test data generating device and method based on binary program |
CN101968766A (en) * | 2010-10-21 | 2011-02-09 | 上海交通大学 | System for detecting software bug triggered during practical running of computer program |
CN102012987A (en) * | 2010-12-02 | 2011-04-13 | 李清宝 | Automatic behavioural analysis system for binary malicious codes |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102841844B (en) * | 2012-07-13 | 2015-12-16 | 北京航空航天大学 | A kind of binary code bug excavation method based on simple and easy semiology analysis |
CN102841844A (en) * | 2012-07-13 | 2012-12-26 | 北京航空航天大学 | Method for binary code vulnerability discovery on basis of simple symbolic execution |
CN102799529A (en) * | 2012-07-13 | 2012-11-28 | 北京航空航天大学 | Generation method of dynamic binary code test case |
CN102799529B (en) * | 2012-07-13 | 2015-11-25 | 北京航空航天大学 | A kind of dynamic binary code method for generating test case |
CN103399780A (en) * | 2013-07-03 | 2013-11-20 | 清华大学 | Integer overflow detecting method based on virtual machine technique and dynamic symbolic execution |
CN103399780B (en) * | 2013-07-03 | 2016-08-17 | 清华大学 | A kind of integer overflow detection method performed based on virtual machine technique and dynamic symbol |
CN103714001A (en) * | 2013-12-23 | 2014-04-09 | 北京工业大学 | Method for analyzing cooperative behaviors between components in software component system |
CN103714001B (en) * | 2013-12-23 | 2017-01-18 | 北京工业大学 | Method for analyzing cooperative behaviors between components in software component system |
CN104503901A (en) * | 2014-12-04 | 2015-04-08 | 中国人民解放军总参谋部第五十四研究所 | Guiding symbol execution method based on static path analysis |
CN104503901B (en) * | 2014-12-04 | 2017-08-25 | 中国人民解放军总参谋部第五十四研究所 | A kind of guiding symbolic excution methodology analyzed based on static path |
CN105760219A (en) * | 2016-01-29 | 2016-07-13 | 中国人民解放军信息工程大学 | Parallel symbol execution system based on multi-Agent distributed scheduling |
CN105760219B (en) * | 2016-01-29 | 2019-02-12 | 中国人民解放军信息工程大学 | Parallel symbol based on multi-Agent distributed scheduling executes system |
CN107239317A (en) * | 2017-06-07 | 2017-10-10 | 成都四象联创科技有限公司 | Executable program program optimization method |
CN107358106A (en) * | 2017-07-11 | 2017-11-17 | 北京奇虎科技有限公司 | Leak detection method, Hole Detection device and server |
CN109426722B (en) * | 2017-09-01 | 2021-06-29 | 深圳市源伞新科技有限公司 | SQL injection defect detection method, system, equipment and storage medium |
CN109426722A (en) * | 2017-09-01 | 2019-03-05 | 深圳市源伞新科技有限公司 | SQL injection defect inspection method, system, equipment and storage medium |
CN107885663A (en) * | 2017-11-29 | 2018-04-06 | 中国电子产品可靠性与环境试验研究所 | Method, apparatus, computer equipment and the storage medium of automatic generating test case |
CN107885663B (en) * | 2017-11-29 | 2021-01-22 | 中国电子产品可靠性与环境试验研究所 | Method and device for automatically generating test case, computer equipment and storage medium |
CN108228187B (en) * | 2018-01-02 | 2020-03-17 | 南京大学 | Global optimization method of numerical program |
CN108228187A (en) * | 2018-01-02 | 2018-06-29 | 南京大学 | A kind of global optimization method of mathematical program |
CN108845944A (en) * | 2018-06-28 | 2018-11-20 | 中国人民解放军国防科技大学 | Method for improving software fuzz testing efficiency by combining symbolic execution |
CN108845944B (en) * | 2018-06-28 | 2021-10-15 | 中国人民解放军国防科技大学 | Method for improving software fuzz testing efficiency by combining symbolic execution |
CN111367786A (en) * | 2018-12-26 | 2020-07-03 | 华为技术有限公司 | Symbol execution method, electronic equipment and storage medium |
CN111367786B (en) * | 2018-12-26 | 2021-06-08 | 华为技术有限公司 | Symbol execution method, electronic equipment and storage medium |
CN109992968A (en) * | 2019-03-25 | 2019-07-09 | 北京理工大学 | Android malicious act dynamic testing method based on binary system dynamic pitching pile |
CN116361182A (en) * | 2023-04-03 | 2023-06-30 | 南京航空航天大学 | Symbol execution method for error state guidance |
CN116361182B (en) * | 2023-04-03 | 2023-12-05 | 南京航空航天大学 | Symbol execution method for error state guidance |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102222035A (en) | Software behavior detection system based on symbolic execution technology and detection method thereof | |
CN109739755B (en) | Fuzzy test system based on program tracking and mixed execution | |
CN101408862B (en) | Embedded system test method | |
CN102222041A (en) | Test analysis system and method based on embedded software | |
CN103678105A (en) | Page code testing method and device | |
CN102243609A (en) | Embedded software-based test analysis method and system | |
CN111291384B (en) | Vulnerability scanning method and device and electronic equipment | |
CN102789413A (en) | System and method for debugging parallel program | |
CN105022691A (en) | Highly automatic software testing method based on UML diagram | |
CN103425572A (en) | Code analyzing method and system | |
CN105094939B (en) | A kind of software source file Static Analysis Method realized based on the automatic techniques of compiling of Makefile | |
CN112506564B (en) | Method, system and medium for establishing control flow graph | |
CN105204985A (en) | Vulnerability detection method and device | |
CN110941553A (en) | Code detection method, device, equipment and readable storage medium | |
CN104572428A (en) | Complicated control testing method based on windows operating system | |
CN108399321B (en) | Software local plagiarism detection method based on dynamic instruction dependence graph birthmark | |
CN101661409B (en) | Extraction method of parallel program communication mode and system | |
CN103309811A (en) | Method for quickly positioning software code defects based on test execution record | |
CN101458630B (en) | Self-modifying code identification method based on hardware emulator | |
CN103744788B (en) | The characteristic positioning method analyzed based on multi-source software data | |
CN102521135B (en) | The method of testing of linear system and device | |
CN106294136B (en) | The online test method and system of performance change between the concurrent program runtime | |
CN102214141B (en) | Real-time stack-based program slicing method | |
JP2005216078A (en) | Generation system for transaction profile for computer system performance measurement analysis, generation method therefor and program | |
Abou Assi et al. | Substate profiling for effective test suite reduction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20111019 |