CN102222035A - Software behavior detection system based on symbolic execution technology and detection method thereof - Google Patents

Software behavior detection system based on symbolic execution technology and detection method thereof Download PDF

Info

Publication number
CN102222035A
CN102222035A CN2011102095144A CN201110209514A CN102222035A CN 102222035 A CN102222035 A CN 102222035A CN 2011102095144 A CN2011102095144 A CN 2011102095144A CN 201110209514 A CN201110209514 A CN 201110209514A CN 102222035 A CN102222035 A CN 102222035A
Authority
CN
China
Prior art keywords
module
constraint
constraint condition
executable program
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011102095144A
Other languages
Chinese (zh)
Inventor
姚伟
丁保贞
宋铮
杭强伟
林九川
赵帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN2011102095144A priority Critical patent/CN102222035A/en
Publication of CN102222035A publication Critical patent/CN102222035A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a software behavior detection system based on symbolic execution technology and a detection method thereof, wherein the detection system consists of a constraint generation module, a constraint negation/optimization module, a constraint solution module, a binary code pile pitching module and a behavior monitor module; and the method specifically comprises the following steps of: monitoring software behavior in the actual execution process of a program, collecting information relevant to the behavior, and providing certain essential data for behavior analysis; and simultaneously, collecting the constraint condition of the current path; after the program execution is finished, negating a certain constraint condition in the set of collected path constraint conditions so as to acquire a new patch constraint set, and solving the newly generated new patch constraint set by using a solver so as to determine whether a path can be achieved; and if the preconditions traversing the patch can be met, triggering a new software behavior by traversing the path. The system and the method can efficiently improve the precision and comprehensiveness of behavior detection.

Description

Software action detection system and detection method based on the symbol execution technique
Technical field
The present invention relates to the software action analytical technology, be specifically related to a kind of software action detection system and based on the detection method of this system.
Background technology
The software action analysis is to be object with software, is undertaken manually or automatically analyzing by static state or dynamic method, to verify, confirm, to monitor or find the process and the activity of software character, finds the behavior and the function of software.Say that intuitively the purpose of software action analysis is understood software exactly and what has been done in operating system, perhaps what can be done.Software action detects and to be meant the behavior that detects software, collects the information relevant with behavior, and the live telecast that provides software systems to move is for software action analysis and prediction provide basic data, so that system is carried out the software action analysis.
The software action detection technique is according to obtaining the approach difference of information, is divided into static information and obtains with multidate information and obtain.Static information obtains the software action information of obtaining statically that is meant from program.Static state obtain have the coverage rate height, fireballing advantage, but have certain wrong report, and can't analyze the program that adopts the obfuscated codes technology; Multidate information obtains and is meant in the program implementation process, and the running status by prize procedure obtains program information.Dynamic information is captured in real time, and performed instruction all is effectively, triggers opportunity but dynamic analysing method depends on software action, in the software action context of detection, has hysteresis quality and characteristics such as consuming time.
Summary of the invention
The present invention is directed to the existing existing deficiency of software action detection technique, technical matters to be solved comprises two aspects: first aspect provides a kind of software action detection system based on the symbol execution technique, and second invention provides corresponding detecting method.
For solving technique scheme, the technical solution used in the present invention is as follows:
Based on the software action detection system of symbol execution technique, described detection system comprises constraint generation module, constraint negate/optimal module, constraint solving module, binary code pitching pile module, behavior monitoring module;
Described scale-of-two pitching pile module is inserted into detection of code in the executable program, obtaining executable program multidate information in the process of implementation, and testing result is fed back to the constraint generation module;
Described constraint generation module generates character expression and constraint condition in the executable program implementation, form corresponding constraint condition set;
Described behavior monitoring module is monitored in real time to software action in the executable program implementation;
Described constraint negate/optimal module is after executable program is finished, certain constraint condition negate that the constraint condition collected is concentrated also is optimized constraint condition set, produce new constraint condition set, but the described new corresponding new execution route of constraint condition set;
Described constraint solving module is found the solution new constraint condition set, and it separates corresponding new input, but and the new path of driving program execution.
Further, described constraint generation module comprises register expression formula module, memory address expression formula module, constraint condition expression formula module, described register is expressed the formula module, when the destination operand of the current execution command of executable program is register, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate register and express formula; Described memory address expression formula module, when the current execution command destination operand of executable program is memory address, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate the memory address expression formula; Described constraint condition expression formula module, when the current execution command of executable program is branch's jump instruction, according to the instruction type of the current execution command of binary code pitching pile module acquisition executable program, information such as instruction operands generate the constraint condition expression formula.
Further, described constraint solving module is found the solution the constraint condition set that meets its syntax rule by constraint solving instrument STP, produces the new set of separating, and this set can be used as the input boot of executable program and carries out new path.
Further, described constraint negate/optimal module is according to routing strategy certain constraint condition in the current path constraint condition set to be carried out negate, the purpose of optimizing is to reduce the constraint condition number of generation, thereby reduces the query requests to constraint solver, improves analysis efficiency.
Further again, described scale-of-two pitching pile module, the plug-in mounting mechanism of using code instrumentation instrument DynamoRIO to provide, dynamically be inserted into monitoring code in the executable program, the monitoring code that inserts is for the execution state information in the real-time acquisition executable program implementation, as the return results after the executable program calling system API etc.; Some interfaces that provide according to DynamoRIO can interception system API, finishes the monitoring task to calling system API in the executable program.According to some interfaces that DynamoRIO provides, can obtain the register value of current executable program, PC value, the multidate information when some in the executable program implementations such as instruction opcode value are moved.
Further again, described behavior monitoring module is that the software action that triggers in the executable program implementation is monitored in real time, obtains the information relevant with behavior, for the software action analysis provides basic data; The a series of program statements or the system call of described software action respective specific function are exactly that the real-time follow-up monitoring is carried out in a series of program statements or the system call of respective specific function to the monitoring of software action.
Based on the software action detection method of symbol execution technique, described detection method comprises the steps:
(1) be written into executable program and start after, by binary code pitching pile module monitoring code is inserted in the target program, obtain target program multidate information in the process of implementation, provide the live telecast of system's operation, for behavioural analysis provides basic data;
(2) after executable program started, the behavior monitoring module was monitored in real time to software action, and the collection information relevant with behavior;
(3) in the executable program implementation, every instruction carrying out in the constraint generation module identification executable program implementation, and according to information such as the instruction type of this instruction, instruction operands, generate corresponding character expression, if run into branch's redirect statement, then generate the constraint condition expression formula, form corresponding constraint condition set;
(4) after program is finished, constraint negate/optimal module is concentrated certain constraint condition expression formula negate according to routing strategy to the constraint condition of collecting, and produces new constraint condition set, but the corresponding new execution route of this constraint condition set;
(5) the constraint solving module is found the solution the path constraint condition set of new generation, produces a new test case, and this test case is carried out according to new path as the input driver of program;
(6) execution in step (1) is to (5) repeatedly, and the reachable path in the traversal program is finished the behavior detection to software.
The present invention mainly is the behavior detection at binary executable, improved accuracy rate that behavior detects and comprehensive, and adopted the symbol execution technique, the advantage of combined symbol execution technique, the dynamic reachable path in the traversal program, possible software action in the trigger, improve comprehensive that software action detects, in the practical implementation of program, software action is monitored, improved the accuracy that software action detects.
The present invention is used in the symbol execution technique in the software action detection, obtains higher Program path coverage rate, makes testing result more complete.Use dynamic monitoring method, strengthened the accuracy and the cogency of testing result greatly.
Description of drawings
Further specify the present invention below in conjunction with the drawings and specific embodiments.
Fig. 1 is the block diagram of detection system among the present invention.
Embodiment
For technological means, creation characteristic that the present invention is realized, reach purpose and effect is easy to understand, below in conjunction with concrete diagram, further set forth the present invention.
The present invention utilizes the symbol execution technique to convert program to character expression, the path constraint condition of collection procedure in the program implementation process, after program is finished, according to routing strategy, certain constraint condition negate in the current path constraint condition set produces new constraint condition set, and with constraint solver it is found the solution, obtain one and separate set, this set can boot be carried out new path.Carry out the reachable path of this step in can traversal program repeatedly.
Based on above-mentioned principle, concrete enforcement of the present invention is as follows:
Referring to Fig. 1, the software action detection system 100 based on the symbol execution technique provided by the invention comprises constraint generation module 103, constraint negate/optimal module 104, constraint solving module 105, binary code pitching pile module 101, behavior monitoring module 102.
Wherein, scale-of-two pitching pile module 101 is inserted into detection of code in the executable program, in the program implementation process, obtains executable program multidate information in the process of implementation, and testing result fed back to the constraint generation module, as the foundation that generates the constraint expression formula.
This scale-of-two pitching pile module, the plug-in mounting mechanism of using code instrumentation instrument DynamoRIO to provide, dynamically be inserted into monitoring code in the executable program, the monitoring code that inserts is for the execution state information in the real-time acquisition executable program implementation, as the return results after the invokes system API etc.; Some interfaces that provide according to DynamoRIO can interception system API, finishes the monitoring task to calling system API in the executable program.According to some interfaces that DynamoRIO provides, can obtain the register value of current executable program, PC value, the multidate information when some in the executable program implementations such as instruction opcode value are moved.
Constraint generation module 103 is in the executable program implementation, every instruction carrying out in the identification executable program implementation, and according to information such as the instruction type of this instruction, instruction operands, generate corresponding character expression, if run into branch's redirect statement, then generate the constraint condition expression formula, form corresponding constraint condition set;
For this reason, constraint generation module 103 comprises register expression formula module, memory address expression formula module, constraint condition expression formula module.
Register is expressed the formula module, if when the destination operand of the current execution command of program is register, and the instruction type of the current execution command of program that obtains according to binary code pitching pile module, information such as instruction operands generate register and express formula.
When if the current execution command destination operand of memory address expression formula module program is memory address, the instruction type of the current execution command of program that obtains according to binary code pitching pile module, information such as instruction operands generate the memory address expression formula
Constraint condition expression formula module when if the current execution command of program is branch's jump instruction, obtains the instruction type of the current execution command of program according to binary code pitching pile module, and information such as instruction operands generate the constraint condition expression formula.
Behavior monitoring module 102 is that the software action that triggers in the executable program implementation is monitored in real time, obtains the information relevant with behavior, for the software action analysis provides basic data.Software action can be a series of program statements or the system call of certain specific function, to the monitoring of software action is exactly that the real-time follow-up monitoring is carried out in the program statement or the system call of these specific functions, knows that program done those work in the process of implementation.Monitoring to software action realizes by the code instrumentation module, as the monitoring that system call API is carried out, the interface function that can provide by DynamoRIO is intercepted and captured the parameter transmitted before the invokes system API or the API of system and is carried out the result who returns after finishing.
Constraint negate/optimal module 104 is after executable program is finished, according to routing strategy certain the constraint condition expression formula in the constraint condition set of collecting (being the constraint condition expression formula collection of current path) is carried out negate, produce a new constraint condition set, new execution route in the corresponding program of this new constraint condition set.Retrain 104 pairs of current constraint condition sets of negate/optimal module (negate before constraint condition set) simultaneously and be optimized, the efficient of finding the solution with raising.The purpose of optimizing is to reduce the constraint condition number of generation, thereby reduces the query requests to constraint solver, improves analysis efficiency
105 pairs of new constraint condition sets of constraint solving module are found the solution, and it separates corresponding new input, but and the new path of driving program execution.
This constraint solving module is found the solution the constraint condition set that meets its syntax rule by constraint solving instrument STP, produces the new set of separating, and this set can be used as the input boot of executable program and carries out new path.
Based on above-mentioned detection system, its detection method comprises the steps (referring to Fig. 1):
(1) is written into binary executable (target program), behind program start, by binary code pitching pile module monitoring code is inserted in the target program, obtain target program multidate information in the process of implementation, provide the live telecast of system's operation, for behavioural analysis provides basic data;
(2) after executable program (target program) started, the behavior monitoring module was monitored in real time to software action, and the collection information relevant with behavior;
(3) in executable program (target program) implementation, every instruction carrying out in the constraint generation module recognition objective program process, and according to information such as the instruction type of this instruction, instruction operands, generate corresponding character expression, if run into branch's redirect statement, then generate the constraint condition expression formula, form corresponding constraint condition set;
(4) after program is finished, constraint negate/optimal module is according to routing strategy, and certain the constraint condition negate to the constraint condition of collecting is concentrated produces new constraint condition set, but the corresponding new execution route of this constraint condition set;
(5) the constraint solving module is found the solution the path constraint condition set of new generation, produces a new test case, and this test case is carried out according to new path as the input driver of program;
(6) execution in step (1) is to (5) repeatedly, and the reachable path in the traversal program is finished the behavior detection to software.
Based on above-mentioned detection method, the present invention at first selects an initial use-case to import as program, is used for driver and carries out according to the path of this initial use-case correspondence.
Start and executive routine, in the program implementation process, collect constraint condition, and in the program implementation process, the software action that triggers is monitored, collect the information relevant with behavior.
After program is finished, certain constraint condition that the constraint condition of collecting is concentrated is carried out negate, produce a new constraint condition set, find the solution with constraint solver the back, obtain a new test case, this test case can boot be carried out new path, carries out so repeatedly, in the program pass process of reality, reach the purpose that software action is detected.
More than show and described ultimate principle of the present invention, principal character and advantage of the present invention.The technician of the industry should understand; the present invention is not restricted to the described embodiments; that describes in the foregoing description and the instructions just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.The claimed scope of the present invention is defined by appending claims and equivalent thereof.

Claims (7)

1. based on the software action detection system of symbol execution technique, it is characterized in that described detection system comprises constraint generation module, constraint negate/optimal module, constraint solving module, binary code pitching pile module, behavior monitoring module;
Described scale-of-two pitching pile module is inserted into detection of code in the executable program, obtaining executable program multidate information in the process of implementation, and testing result is fed back to the constraint generation module;
Described constraint generation module generates character expression and constraint condition in the executable program implementation, form corresponding constraint condition set;
Described behavior monitoring module is monitored in real time to software action in the executable program implementation;
Described constraint negate/optimal module is after executable program is finished, certain constraint condition negate that the constraint condition collected is concentrated also is optimized constraint condition set, produce new constraint condition set, but the described new corresponding new execution route of constraint condition set;
Described constraint solving module is found the solution new constraint condition set, and it separates corresponding new input, but and the new path of driving program execution.
2. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described constraint generation module comprises register expression formula module, memory address expression formula module, constraint condition expression formula module, described register is expressed the formula module, when the destination operand of the current execution command of executable program is register, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate register and express formula; Described memory address expression formula module, when the current execution command destination operand of executable program is memory address, information such as the instruction type of the current execution command of executable program that obtains according to binary code pitching pile module, instruction operands generate the memory address expression formula; Described constraint condition expression formula module, when the current execution command of executable program is branch's jump instruction, according to the instruction type of the current execution command of binary code pitching pile module acquisition executable program, information such as instruction operands generate the constraint condition expression formula.
3. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described constraint solving module is found the solution the constraint condition set that meets its syntax rule by constraint solving instrument STP, produce the new set of separating, this set can be used as the input boot of executable program and carries out new path.
4. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described constraint negate/optimal module is according to routing strategy certain constraint condition in the current path constraint condition set to be carried out negate, and is optimized.
5. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described scale-of-two pitching pile module, the plug-in mounting mechanism of using code instrumentation instrument DynamoRIO to provide, dynamically be inserted into monitoring code in the executable program, obtain execution state information in the executable program implementation in real time by the monitoring code that inserts, and the corresponding interface that provides according to DynamoRIO, can interception system API, finish monitoring task to calling system API in the executable program; And according to the corresponding interface that DynamoRIO provides, obtain the register value of current executable program, PC value, the multidate information when moving in the executable program implementations such as instruction opcode value.
6. the software action detection system based on the symbol execution technique according to claim 1, it is characterized in that, described behavior monitoring module is that the software action that triggers in the executable program implementation is monitored in real time, obtain the information relevant, for the software action analysis provides basic data with behavior; The a series of program statements or the system call of described software action respective specific function are exactly that the real-time follow-up monitoring is carried out in a series of program statements or the system call of respective specific function to the monitoring of software action.
7. based on the software action detection method of symbol execution technique, it is characterized in that described detection method comprises the steps:
(1) be written into executable program and start after, by binary code pitching pile module monitoring code is inserted in the target program, obtain target program multidate information in the process of implementation, provide the live telecast of system's operation, for behavioural analysis provides basic data;
(2) after executable program started, the behavior monitoring module was monitored in real time to software action, and the collection information relevant with behavior;
(3) in the executable program implementation, every instruction carrying out in the constraint generation module identification executable program implementation, and according to information such as the instruction type of this instruction, instruction operands, generate corresponding character expression, if run into branch's redirect statement, then generate the constraint condition expression formula, form corresponding constraint condition set;
(4) after program is finished, constraint negate/optimal module is concentrated certain constraint condition expression formula negate according to routing strategy to the constraint condition of collecting, and produces new constraint condition set, but the corresponding new execution route of this constraint condition set;
(5) the constraint solving module is found the solution the path constraint condition set of new generation, produces a new test case, and this test case is carried out according to new path as the input driver of program;
(6) execution in step (1) is to (5) repeatedly, and the reachable path in the traversal program is finished the behavior detection to software.
CN2011102095144A 2011-07-25 2011-07-25 Software behavior detection system based on symbolic execution technology and detection method thereof Pending CN102222035A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102095144A CN102222035A (en) 2011-07-25 2011-07-25 Software behavior detection system based on symbolic execution technology and detection method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102095144A CN102222035A (en) 2011-07-25 2011-07-25 Software behavior detection system based on symbolic execution technology and detection method thereof

Publications (1)

Publication Number Publication Date
CN102222035A true CN102222035A (en) 2011-10-19

Family

ID=44778591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102095144A Pending CN102222035A (en) 2011-07-25 2011-07-25 Software behavior detection system based on symbolic execution technology and detection method thereof

Country Status (1)

Country Link
CN (1) CN102222035A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102799529A (en) * 2012-07-13 2012-11-28 北京航空航天大学 Generation method of dynamic binary code test case
CN102841844A (en) * 2012-07-13 2012-12-26 北京航空航天大学 Method for binary code vulnerability discovery on basis of simple symbolic execution
CN103399780A (en) * 2013-07-03 2013-11-20 清华大学 Integer overflow detecting method based on virtual machine technique and dynamic symbolic execution
CN103714001A (en) * 2013-12-23 2014-04-09 北京工业大学 Method for analyzing cooperative behaviors between components in software component system
CN104503901A (en) * 2014-12-04 2015-04-08 中国人民解放军总参谋部第五十四研究所 Guiding symbol execution method based on static path analysis
CN105760219A (en) * 2016-01-29 2016-07-13 中国人民解放军信息工程大学 Parallel symbol execution system based on multi-Agent distributed scheduling
CN107239317A (en) * 2017-06-07 2017-10-10 成都四象联创科技有限公司 Executable program program optimization method
CN107358106A (en) * 2017-07-11 2017-11-17 北京奇虎科技有限公司 Leak detection method, Hole Detection device and server
CN107885663A (en) * 2017-11-29 2018-04-06 中国电子产品可靠性与环境试验研究所 Method, apparatus, computer equipment and the storage medium of automatic generating test case
CN108228187A (en) * 2018-01-02 2018-06-29 南京大学 A kind of global optimization method of mathematical program
CN108845944A (en) * 2018-06-28 2018-11-20 中国人民解放军国防科技大学 Method for improving software fuzz testing efficiency by combining symbolic execution
CN109426722A (en) * 2017-09-01 2019-03-05 深圳市源伞新科技有限公司 SQL injection defect inspection method, system, equipment and storage medium
CN109992968A (en) * 2019-03-25 2019-07-09 北京理工大学 Android malicious act dynamic testing method based on binary system dynamic pitching pile
CN111367786A (en) * 2018-12-26 2020-07-03 华为技术有限公司 Symbol execution method, electronic equipment and storage medium
CN116361182A (en) * 2023-04-03 2023-06-30 南京航空航天大学 Symbol execution method for error state guidance

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040107409A1 (en) * 2002-12-03 2004-06-03 Melham Thomas F. Automatic symbolic indexing methods for formal verification on a symbolic lattice domain
CN101714119A (en) * 2009-12-09 2010-05-26 北京邮电大学 Test data generating device and method based on binary program
CN101968766A (en) * 2010-10-21 2011-02-09 上海交通大学 System for detecting software bug triggered during practical running of computer program
CN102012987A (en) * 2010-12-02 2011-04-13 李清宝 Automatic behavioural analysis system for binary malicious codes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040107409A1 (en) * 2002-12-03 2004-06-03 Melham Thomas F. Automatic symbolic indexing methods for formal verification on a symbolic lattice domain
CN101714119A (en) * 2009-12-09 2010-05-26 北京邮电大学 Test data generating device and method based on binary program
CN101968766A (en) * 2010-10-21 2011-02-09 上海交通大学 System for detecting software bug triggered during practical running of computer program
CN102012987A (en) * 2010-12-02 2011-04-13 李清宝 Automatic behavioural analysis system for binary malicious codes

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841844B (en) * 2012-07-13 2015-12-16 北京航空航天大学 A kind of binary code bug excavation method based on simple and easy semiology analysis
CN102841844A (en) * 2012-07-13 2012-12-26 北京航空航天大学 Method for binary code vulnerability discovery on basis of simple symbolic execution
CN102799529A (en) * 2012-07-13 2012-11-28 北京航空航天大学 Generation method of dynamic binary code test case
CN102799529B (en) * 2012-07-13 2015-11-25 北京航空航天大学 A kind of dynamic binary code method for generating test case
CN103399780A (en) * 2013-07-03 2013-11-20 清华大学 Integer overflow detecting method based on virtual machine technique and dynamic symbolic execution
CN103399780B (en) * 2013-07-03 2016-08-17 清华大学 A kind of integer overflow detection method performed based on virtual machine technique and dynamic symbol
CN103714001A (en) * 2013-12-23 2014-04-09 北京工业大学 Method for analyzing cooperative behaviors between components in software component system
CN103714001B (en) * 2013-12-23 2017-01-18 北京工业大学 Method for analyzing cooperative behaviors between components in software component system
CN104503901A (en) * 2014-12-04 2015-04-08 中国人民解放军总参谋部第五十四研究所 Guiding symbol execution method based on static path analysis
CN104503901B (en) * 2014-12-04 2017-08-25 中国人民解放军总参谋部第五十四研究所 A kind of guiding symbolic excution methodology analyzed based on static path
CN105760219A (en) * 2016-01-29 2016-07-13 中国人民解放军信息工程大学 Parallel symbol execution system based on multi-Agent distributed scheduling
CN105760219B (en) * 2016-01-29 2019-02-12 中国人民解放军信息工程大学 Parallel symbol based on multi-Agent distributed scheduling executes system
CN107239317A (en) * 2017-06-07 2017-10-10 成都四象联创科技有限公司 Executable program program optimization method
CN107358106A (en) * 2017-07-11 2017-11-17 北京奇虎科技有限公司 Leak detection method, Hole Detection device and server
CN109426722B (en) * 2017-09-01 2021-06-29 深圳市源伞新科技有限公司 SQL injection defect detection method, system, equipment and storage medium
CN109426722A (en) * 2017-09-01 2019-03-05 深圳市源伞新科技有限公司 SQL injection defect inspection method, system, equipment and storage medium
CN107885663A (en) * 2017-11-29 2018-04-06 中国电子产品可靠性与环境试验研究所 Method, apparatus, computer equipment and the storage medium of automatic generating test case
CN107885663B (en) * 2017-11-29 2021-01-22 中国电子产品可靠性与环境试验研究所 Method and device for automatically generating test case, computer equipment and storage medium
CN108228187B (en) * 2018-01-02 2020-03-17 南京大学 Global optimization method of numerical program
CN108228187A (en) * 2018-01-02 2018-06-29 南京大学 A kind of global optimization method of mathematical program
CN108845944A (en) * 2018-06-28 2018-11-20 中国人民解放军国防科技大学 Method for improving software fuzz testing efficiency by combining symbolic execution
CN108845944B (en) * 2018-06-28 2021-10-15 中国人民解放军国防科技大学 Method for improving software fuzz testing efficiency by combining symbolic execution
CN111367786A (en) * 2018-12-26 2020-07-03 华为技术有限公司 Symbol execution method, electronic equipment and storage medium
CN111367786B (en) * 2018-12-26 2021-06-08 华为技术有限公司 Symbol execution method, electronic equipment and storage medium
CN109992968A (en) * 2019-03-25 2019-07-09 北京理工大学 Android malicious act dynamic testing method based on binary system dynamic pitching pile
CN116361182A (en) * 2023-04-03 2023-06-30 南京航空航天大学 Symbol execution method for error state guidance
CN116361182B (en) * 2023-04-03 2023-12-05 南京航空航天大学 Symbol execution method for error state guidance

Similar Documents

Publication Publication Date Title
CN102222035A (en) Software behavior detection system based on symbolic execution technology and detection method thereof
CN109739755B (en) Fuzzy test system based on program tracking and mixed execution
CN101408862B (en) Embedded system test method
CN102222041A (en) Test analysis system and method based on embedded software
CN103678105A (en) Page code testing method and device
CN102243609A (en) Embedded software-based test analysis method and system
CN111291384B (en) Vulnerability scanning method and device and electronic equipment
CN102789413A (en) System and method for debugging parallel program
CN105022691A (en) Highly automatic software testing method based on UML diagram
CN103425572A (en) Code analyzing method and system
CN105094939B (en) A kind of software source file Static Analysis Method realized based on the automatic techniques of compiling of Makefile
CN112506564B (en) Method, system and medium for establishing control flow graph
CN105204985A (en) Vulnerability detection method and device
CN110941553A (en) Code detection method, device, equipment and readable storage medium
CN104572428A (en) Complicated control testing method based on windows operating system
CN108399321B (en) Software local plagiarism detection method based on dynamic instruction dependence graph birthmark
CN101661409B (en) Extraction method of parallel program communication mode and system
CN103309811A (en) Method for quickly positioning software code defects based on test execution record
CN101458630B (en) Self-modifying code identification method based on hardware emulator
CN103744788B (en) The characteristic positioning method analyzed based on multi-source software data
CN102521135B (en) The method of testing of linear system and device
CN106294136B (en) The online test method and system of performance change between the concurrent program runtime
CN102214141B (en) Real-time stack-based program slicing method
JP2005216078A (en) Generation system for transaction profile for computer system performance measurement analysis, generation method therefor and program
Abou Assi et al. Substate profiling for effective test suite reduction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20111019