CN109117364A - A kind of object-oriented method for generating test case and system - Google Patents

A kind of object-oriented method for generating test case and system Download PDF

Info

Publication number
CN109117364A
CN109117364A CN201810713776.6A CN201810713776A CN109117364A CN 109117364 A CN109117364 A CN 109117364A CN 201810713776 A CN201810713776 A CN 201810713776A CN 109117364 A CN109117364 A CN 109117364A
Authority
CN
China
Prior art keywords
input
node
distance
oriented
branch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810713776.6A
Other languages
Chinese (zh)
Other versions
CN109117364B (en
Inventor
李丰
彭佳琪
刘丙昌
许丽丽
陈宏程
刘炳宏
霍玮
邹维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201810713776.6A priority Critical patent/CN109117364B/en
Publication of CN109117364A publication Critical patent/CN109117364A/en
Application granted granted Critical
Publication of CN109117364B publication Critical patent/CN109117364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases

Abstract

The present invention provides a kind of object-oriented method for generating test case, and step includes: each node range-to-go on the CFG for calculate target program, which is a node or a line on CFG;Guiding fuzz testing is carried out according to this distance, if the input coverage goal, generates object-oriented test case, otherwise calls guiding semiology analysis;It is synchronized to the input that semiology analysis generates is oriented in the queue of guiding fuzz testing preferentially to make a variation, if the input coverage goal, generates object-oriented test case.The present invention will be oriented to fuzz testing and guiding semiology analysis combines, and not only having solved fuzz testing can not make a variation the scaling concern for meeting the limitation of Complex Constraints, but also can overcome the disadvantages that semiology analysis;Interactive strategy when more efficient guiding strategy and the two combination is devised simultaneously, improves object-oriented Test cases technology efficiency.

Description

A kind of object-oriented method for generating test case and system
Technical field
The present invention relates to field of software engineering, specially a kind of efficient object-oriented method for generating test case and it is System.
Background technique
Software test is one important component of field of software engineering, and ensures the crucial skill of computer software quality Art.Software testing technology mainly passes through the means that construction test case is used for operating system, that may be present in software to find Defect.Therefore, software test highlights test case to the covering power of target program, and coverage rate is higher, and program is tested It obtains more abundant.At the same time, how to generate suitable test case makes test that can pointedly cover specified target, The crucial branch of one be increasingly becoming in software test research.The technology can be applied to multiple scenes, such as:
A) crash reappears: when user reports crash to manufacturer, manufacturer need to be according to known crash report come structure It makes input and reappears collapse scene, and the input requirements can at least cover the sentence of triggering crash;
B) test case gain: when software upgrading, need to construct new test case realize to after update program it is complete Whole test need to generate suitable test case as target newly to add code at this time;
C) static detection result verification: the potential loophole sentence for selecting static auditing tool to detect is target, and construction is corresponding Input runtime verification whether necessary being loophole.
Existing Test cases technology technology includes grey box testing, semiology analysis, stain analysis etc., and to object-oriented Test cases technology then adds Guidance on the basis of these technologies, to rapidly cover specified target, specifically includes that
(1) it is oriented to fuzz testing: is added in fuzz testing technical foundation of the tradition towards coverage rate to input and mesh The distance between mark measurement, and variation relevant parameter is adjusted according to metric.However this strategy can not change fuzz testing The limitation of itself is difficult to meet complicated constraint by variation, as magic number is checked.
(2) it is oriented to semiology analysis: adding a variety of strategies on the basis of conventional symbols execute, improve the efficiency of track search, It is close including distance is explored, explored on the reachable slice of target, given with the backward symbol that function call chain is guidance Higher weight of branch etc..However, these strategies can not still break through semiology analysis and be difficult to extend in the program of path-oriented complexity Limitation and the technology itself there is also support the problems such as insufficient, solver ability is limited for library function.
Therefore, it presently, there are by the technology of fuzz testing and semiology analysis combination, for making up respective deficiency, however is somebody's turn to do Technology is still to be not directly applicable object-oriented Test cases technology scene herein towards program high coverage rate.
To sum up, there is respectively limitation in existing object-oriented Test cases technology technology, cannot be quickly generated covering and refer to The input to set the goal.
Summary of the invention
In order to overcome the shortcomings of that existing guiding fuzz testing meets ability to Complex Constraints, the present invention propose it is a kind of towards The method for generating test case and system of target combine guiding fuzz testing and guiding semiology analysis, have both solved fuzzy survey Try the scaling concern for meeting the limitation of Complex Constraints, and can overcome the disadvantages that semiology analysis that can not make a variation;It devises and more increases simultaneously Interactive strategy when the guiding strategy and the two of effect combine, improves object-oriented Test cases technology efficiency.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of object-oriented method for generating test case, step include:
Calculate on the CFG (Control Flow Graph, i.e. controlling stream graph) of target program each node to target away from From the target is a node or a line on CFG;
Guiding fuzz testing is carried out according to this distance, comprising:
For the fitness function of each input addition distance metric;
According to distance metric value, the variation frequency of input is arranged in the position of selection input in the queue;
If inputting coverage goal, object-oriented test case is generated;
If inputting non-coverage goal, and transmission range no longer reduces whithin a period of time, then calls guiding semiology analysis;
The guiding semiology analysis is executed using concolic, comprising:
It sorts to all untreated inputs according to distance, the input priority processing for adjusting the distance nearest;
The node that must be covered for coverage goal is preceding obligatory nodes, must before being constituted according to a series of preceding obligatory nodes Through node sequence, selection needs the missing branch explored to start not cover with next if there is solution in the missing branch The preceding obligatory nodes of lid is carry out semiology analysis to explore more multipath on the CFG after the beta pruning of target, otherwise punching is found in backtracking Prominent branch, the branch for selecting the other side not conflict is explored;
It is synchronized to the input that semiology analysis generates is oriented in the queue of guiding fuzz testing preferentially to make a variation, if this is defeated Enter coverage goal, then generates object-oriented test case.
Wherein, the method for the distance is calculated are as follows:
Calculating any node on the CFG of current function, to the distance db1 of a function call point, which, which is capable of calling, works as Successor function of the preceding function on CG (Call Graph, i.e. calling figure);
Calculate CG on be called function arrive objective function distance df, and multiplication one coefficient x;
From function entrance range-to-go db2 on the CFG of calculating target function;
Entire target program from above-mentioned node range-to-go be db1+xdf+db2.
Wherein, the method for the position of selection input in the queue are as follows:
Using insertion sort, new input is inserted into queue currently variation input below by the position of distance-taxis;
After the every circle traversal of queue, whole sequence is carried out to input.
Wherein, the method for the variation frequency of input is set are as follows:
Transmission range is normalized, variation frequency is adjusted as follows according to normalized transmission range d:
As d=0, new variation frequency is 5 times originally;
As d=1, new variation frequency is 0.4 times originally;
As d=0.5, variation frequency is constant.
Wherein, the concolic execution is to execute rail in input to input record occurrence and symbol constraint simultaneously The missing branch that do not walk is attempted to explore in mark, generates and covers the branch and its input of more multipath later.
Wherein, the range that missing branch is explored is: the farthest preceding obligatory nodes that cover of selection input energy and next A node not covered as source node and mesh node, calculates the node set between this two node, as missing The range that branch is explored.
A kind of object-oriented Test cases technology system (abbreviation PRA), including memory and processor, the memory are deposited Computer program is stored up, which is configured as being executed by the processor, which includes for executing each step in the above method Instruction.
A kind of computer readable storage medium storing computer program, the computer program include instruction, which works as The server is made to execute each step in the above method when being executed by the processor of server.
Compared with prior art, the method for the present invention can be successfully generated more object-oriented tests in the same time Use-case is generating the average time-consuming shorter of test case, and through experimental verification of the present invention, the Driller of the prior art averagely consumes When be 3.7 times of the method for the present invention, the AFLGo time-consuming that is averaged is 2.3 times of the invention.
Detailed description of the invention
Fig. 1 is the specific implementation flow chart that the present invention generates object-oriented test case.
Fig. 2 is the Vean diagram for the difference branch number that PRA and Driller, AFLGo of the present invention are successfully generated input.
Specific embodiment
To enable features described above and advantage of the invention to be clearer and more comprehensible, it is described in detail below.
(1) Integral Thought of the fuzzy test method of guiding in the present invention are as follows: range-to-go degree is inputted by addition Amount, gives the closer input of distance objective with higher variation weight.Specific strategy includes:
Distance metric: the present invention is using the method for calculating distance on CFG in function CG and several functions.For appointing It anticipates a point, calculates in current function on CFG from this point to the distance db1 of a function call point, it is desirable that the point of invocation It is capable of calling successor function of the current function on CG;Then calculate on CG be called function to objective function distance df, And the coefficient (such as 20) of the distance one multiplication is given, carry out the influence power of distance between spread function;Finally in conjunction with objective function From function entrance point range-to-go db2 in interior CFG.Three is added as in entire target program from above-mentioned node to target Distance.
Adjustment variation weight: the present invention adjusts the weight of variation in terms of two, including input variation sequence and input become Alien frequencies rate.For adjustment variation sequence, the present invention uses insertion sort to insert it into current when saving new input every time The position of distance-taxis is pressed in variation input below, to can select preferentially to make a variation apart from nearest input in next time.But this plan It slightly can not achieve queue global orderly, therefore the present invention can carry out whole sequence after the every circle traversal of queue to input, guarantee Next circle still selects nearest preferential variation.For variation frequency is arranged, the present invention needs that preferentially transmission range is normalized Then processing adjusts variation frequency using normalized cumulant.Its basic principle is: the input (minimum value) for being 0 for d, new to become Alien frequencies rate is original 5 times;The input (maximum value) for being 1 for d, new variation frequency are original 0.4 times;For the 0.5 of d It inputs (median), variation frequency remains unchanged.For this purpose, the present invention devises the piecewise function based on exponent arithmetic, such as Shown in lower.
Wherein, n is original variation frequency, and n ' is new variation frequency, and d is the transmission range after normalization.
(2) present invention also uses distance as measurement index, that is, thinks to work as when by fuzz testing and semiology analysis combination When transmission range no longer reduces whithin a period of time, Complex Constraints have been likely to occur in program, then have needed to come by semiology analysis Breakthrough bottleneck.In the interaction with semiology analysis, the present invention can be ranked up input according to distance, and priority processing distance is recently Input.
(3) basic skills that the guiding symbolic execution technique in the present invention uses is that concolic is executed, i.e., for one Input record occurrence and symbol constraint simultaneously, (is denoted as missing for the other side branch that do not walk in input execution track Branch) it attempts to explore, it generates input and covers the branch and its later more multipath.It considers and not all missing branch Explore it is all significant to coverage goal, and at present crucial branch should be distance objective recently and the unsatisfied branch of input, Therefore the present invention is added to guiding strategy when branching selection and symbol are explored on the basis of concolic is executed, specifically such as Under:
Use the branching selection strategy based on preceding necessary sequence guidance: the present invention need to first calculate necessary for coverage goal A series of nodes of covering, i.e., preceding obligatory nodes sequence.The farthest preceding obligatory nodes that cover of selection input energy and next The node not covered for source node and mesh node, calculates the node set between this two o'clock, the model explored as branch It encloses.That is, the node of only missing branch covering belongs within the scope of this, can just select to explore.And in heuristic process In, the present invention also will limit within the scope of this, i.e., using next preceding obligatory nodes not covered as the beta pruning of target after CFG on start further semiology analysis, formed and explored by the local path of transient target of next preceding obligatory nodes.
If if there is the constraint conflict of constraint and the addition of selection branch without solution, i.e., in path in the branch of selection, this hair It is bright to abandon the branch, and be an attempt to backtracking and find on path with its conflicting constraint, then selects the other side and newly add The branch that addition of constraints does not conflict goes to explore, to bypass inappeasable constraint bottleneck.
For the method for the present invention, it is exemplified below an application example, Fig. 1 is its flow chart, specific as follows:
Step 1: a known program P and target T (target is generally a node or a line on program CFG), first The distance between each node and target on CFG are first calculated, is saved into file;Then creation is oriented to fuzzy test process, Including: to each input addition distance metric as fitness function, the position according to metric selection input in the queue Set, according to metric setting variation frequency, operation monitoring input whether coverage goal, illustrate to give birth to if inputting coverage goal (i.e. object-oriented test case) is inputted at target, entire task is completed.
Step 2: judging whether transmission range restrains in fuzz testing at regular intervals, that is, judge defeated in each period It is lower to enter a distance average whether relatively upper period.If lower, illustrating, which can also continue to, makes a variation;If no longer reducing, then it is assumed that Distance no longer restrains, and call sign is needed to execute;When call sign executes, and to all untreated inputs according to distance Sort ascending, apart from nearest input priority processing (see the interaction 1 of Fig. 1).
Step 3: needing to explore according to preceding necessary sequence guidance selection in some input concolic implementation procedure Missing branch.If there is solution in branch, start beta pruning semiology analysis, explores more multipath;If branch answers without solution With branch's Backtracking Strategy, finds conflict branch and negate exploration.Often distance objective is closer for the input generated due to semiology analysis Input, these inputs are synchronized in fuzz testing queue, usually lead to quickly make a variation, accelerate whole input life At efficiency (see the interaction 2 of Fig. 1).
Beneficial effect to illustrate the invention, then tested as follows:
126 programs in cyber-defence match CGC that present invention experiment is held using DAPRA are as data set, each Program has former and later two versions of patch.Carry out Test cases technology experiment by target of newly added patch code, thus altogether Identify 254 targets.Vean diagram as shown in Figure 2, by PRA and it is existing be oriented to fuzzy measuring technology represent AFLGo and The technology that fuzz testing and semiology analysis combine is represented Driller to compare, each target tests 8 hours, with this Verify the effect of guiding strategy and interactive strategy of the invention.
Experimental result: as shown in Fig. 2, 100 are successfully generated branch's number of input for PRA, Driller, AFLGo three; 20 be the only successful branch's number of PRA;The 1 of surface is branch's number (i.e. Driller and AFLGo are successful) of only PRA failure;It is left The 1 of top is the only successful branch's number of Driller;16 be branch's number of PRA, Driller success and AFLGo failure;0 is only The successful branch's number of AFLGo;7 be branch's number of PRA, AFLGo success but Driller failure.As it can be seen that PRA can be in 8 hours Generate test cases for 143 targets, average input generate the time be 41 points 47 seconds;Driller can succeed 118 targets; AFLGo can only succeed 108.Wherein, PRA can almost cover Driller and AFLGo successfully all targets, while can also volume It is outer generate 20 they all do not cover.Target successful for three counts its average time-consuming.PRA average time is 17 points 16 seconds;3 points of average time-consuming 1 hour of Driller 27 seconds, be 3.7 times of PRA;AFLGo it is average time-consuming 40 points 10 seconds, be PRA 2.3 times.It can be seen that guiding method for generating test case proposed by the present invention, than existing methods in operational efficiency and successfully It is obviously improved in quantity.

Claims (8)

1. a kind of object-oriented method for generating test case, step include:
Each node range-to-go on the CFG of target program is calculated, which is a node or a line on CFG;
Guiding fuzz testing is carried out according to this distance, comprising:
For the fitness function of each input addition distance metric;
According to distance metric value, the variation frequency of input is arranged in the position of selection input in the queue;
If inputting coverage goal, object-oriented test case is generated;
If inputting non-coverage goal, and transmission range no longer reduces whithin a period of time, then calls guiding semiology analysis;
The guiding semiology analysis is executed using concolic, comprising:
It sorts to all untreated inputs according to distance, the input priority processing for adjusting the distance nearest;
The node that must be covered for coverage goal is preceding obligatory nodes, a series of necessary knot before being constituted according to preceding obligatory nodes Point sequence, selection need the missing branch explored to start if there is solution in the missing branch with next unlapped Preceding obligatory nodes is carry out semiology analysis to explore more multipath on the CFG after the beta pruning of target, otherwise conflict point is found in backtracking Branch, the branch for selecting the other side not conflict is explored;
It is synchronized to the input that semiology analysis generates is oriented in the queue of guiding fuzz testing preferentially to make a variation, if the input is covered Lid target then generates object-oriented test case.
2. the method as described in claim 1, which is characterized in that the method for calculating the distance are as follows:
Calculating any node on the CFG of current function, to the distance db1 of a function call point, which is capable of calling current letter Successor function of the number on CG;
Calculate CG on be called function arrive objective function distance df, and multiplication one coefficient x;
From function entrance range-to-go db2 on the CFG of calculating target function;
Entire target program from above-mentioned node range-to-go be db1+xdf+db2.
3. the method as described in claim 1, which is characterized in that the method for the position of selection input in the queue are as follows:
Using insertion sort, new input is inserted into queue currently variation input below by the position of distance-taxis;
After the every circle traversal of queue, whole sequence is carried out to input.
4. the method as described in claim 1, which is characterized in that the method for the variation frequency of input is arranged are as follows:
Transmission range is normalized, variation frequency is adjusted as follows according to normalized transmission range d:
As d=0, new variation frequency is 5 times originally;
As d=1, new variation frequency is 0.4 times originally;
As d=0.5, variation frequency is constant.
5. the method as described in claim 1, which is characterized in that the concolic execution is to an input while to record specific Value and symbol constraint, attempt to explore in input execution track for the missing branch do not walked, generate cover the branch and its The input of more multipath later.
6. the method as described in claim 1, which is characterized in that the range that the missing branch is explored is: selection input energy The farthest preceding obligatory nodes and next node not covered covered as source node and mesh node, calculate this two Node set between node, the range explored as missing branch.
7. a kind of object-oriented Test cases technology system, including memory and processor, which stores computer journey Sequence, the program are configured as being executed by the processor, which includes for executing any the method for the claims 1-6 In each step instruction.
8. it is a kind of store computer program computer readable storage medium, the computer program include instruction, the instruction when by The processor of server makes the server execute each step in any the method for the claims 1-6 when executing.
CN201810713776.6A 2018-07-03 2018-07-03 Target-oriented test case generation method and system Active CN109117364B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810713776.6A CN109117364B (en) 2018-07-03 2018-07-03 Target-oriented test case generation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810713776.6A CN109117364B (en) 2018-07-03 2018-07-03 Target-oriented test case generation method and system

Publications (2)

Publication Number Publication Date
CN109117364A true CN109117364A (en) 2019-01-01
CN109117364B CN109117364B (en) 2021-06-15

Family

ID=64822552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810713776.6A Active CN109117364B (en) 2018-07-03 2018-07-03 Target-oriented test case generation method and system

Country Status (1)

Country Link
CN (1) CN109117364B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111191245A (en) * 2019-12-24 2020-05-22 中国人民解放军战略支援部队信息工程大学 Fuzzy test method based on path perception variation strategy
CN111563040A (en) * 2020-05-08 2020-08-21 中国工商银行股份有限公司 Block chain intelligent contract code testing method and device
CN111897733A (en) * 2020-08-07 2020-11-06 北京理工大学 Fuzzy test method and device based on minimum set coverage
CN112052166A (en) * 2020-08-26 2020-12-08 河海大学 Test case generation method and device based on domination relationship
CN112416800A (en) * 2020-12-03 2021-02-26 网易(杭州)网络有限公司 Intelligent contract testing method, device, equipment and storage medium
CN113569252A (en) * 2021-07-07 2021-10-29 四川省信息安全测评中心 Vulnerability detection method based on function and branch coverage by combining neural network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360334A (en) * 2011-10-17 2012-02-22 中国人民解放军信息工程大学 Dynamic and static combined software security test method
US8387018B2 (en) * 2010-09-01 2013-02-26 International Business Machines Corporation Fault localization using directed test generation
US8869110B2 (en) * 2008-02-11 2014-10-21 Codenomicon Oy Method and arrangement for test case creation
CN105740149A (en) * 2016-01-29 2016-07-06 中国人民解放军信息工程大学 Software security detection method based on combination of vulnerability model and symbolic execution
US20160239407A1 (en) * 2015-02-18 2016-08-18 Google Inc. Small scale integration test generation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8869110B2 (en) * 2008-02-11 2014-10-21 Codenomicon Oy Method and arrangement for test case creation
US8387018B2 (en) * 2010-09-01 2013-02-26 International Business Machines Corporation Fault localization using directed test generation
CN102360334A (en) * 2011-10-17 2012-02-22 中国人民解放军信息工程大学 Dynamic and static combined software security test method
US20160239407A1 (en) * 2015-02-18 2016-08-18 Google Inc. Small scale integration test generation
CN105740149A (en) * 2016-01-29 2016-07-06 中国人民解放军信息工程大学 Software security detection method based on combination of vulnerability model and symbolic execution

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李红辉等: "模糊测试技术研究", 《中国科学》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111191245A (en) * 2019-12-24 2020-05-22 中国人民解放军战略支援部队信息工程大学 Fuzzy test method based on path perception variation strategy
CN111191245B (en) * 2019-12-24 2022-06-17 中国人民解放军战略支援部队信息工程大学 Fuzzy test method based on path perception mutation strategy
CN111563040A (en) * 2020-05-08 2020-08-21 中国工商银行股份有限公司 Block chain intelligent contract code testing method and device
CN111563040B (en) * 2020-05-08 2023-08-15 中国工商银行股份有限公司 Block chain intelligent contract code testing method and device
CN111897733A (en) * 2020-08-07 2020-11-06 北京理工大学 Fuzzy test method and device based on minimum set coverage
CN111897733B (en) * 2020-08-07 2023-04-07 北京理工大学 Fuzzy test method and device based on minimum set coverage
CN112052166A (en) * 2020-08-26 2020-12-08 河海大学 Test case generation method and device based on domination relationship
CN112416800A (en) * 2020-12-03 2021-02-26 网易(杭州)网络有限公司 Intelligent contract testing method, device, equipment and storage medium
CN112416800B (en) * 2020-12-03 2023-09-15 网易(杭州)网络有限公司 Intelligent contract testing method, device, equipment and storage medium
CN113569252A (en) * 2021-07-07 2021-10-29 四川省信息安全测评中心 Vulnerability detection method based on function and branch coverage by combining neural network

Also Published As

Publication number Publication date
CN109117364B (en) 2021-06-15

Similar Documents

Publication Publication Date Title
CN109117364A (en) A kind of object-oriented method for generating test case and system
CN103116540B (en) Dynamic symbolic execution method based on overall situation super block dominator graph
US8312440B2 (en) Method, computer program product, and hardware product for providing program individuality analysis for source code programs
US8789054B2 (en) Scheduling policy for efficient parallelization of software analysis in a distributed computing environment
US8769500B2 (en) Node computation initialization technique for efficient parallelization of software analysis in a distributed computing environment
CN105868626B (en) The method of monitoring software business conduct based on control stream coarseness integrality
US8914775B2 (en) Dynamic and intelligent partial computation management for efficient parallelization of software analysis in a distributed computing environment
CN110471652A (en) Task method of combination, composer, equipment and readable storage medium storing program for executing
CN112765031A (en) Decomposition method of crowd-sourcing vulnerability mining task
Schmidt et al. An automatic architecture reconstruction and refactoring framework
US8539500B2 (en) Efficient partial execution for the parallelization of software analysis in a distributed computing environment
CN112860545B (en) Software defect detection method and device
CN110222243A (en) Determine the method, apparatus and storage medium of abnormal behaviour
CN104461864A (en) Java source code defect detecting method and system based on Eclipse plugin
Chen et al. Exploiting branch constraints without exhaustive path enumeration
CN110069347A (en) A kind of thread dividing method of Kernel-based methods different degree
Li et al. Soncraft: A tool for construction, simulation, and analysis of structured occurrence nets
CN114462043A (en) Java anti-serialization vulnerability detection system and method based on reinforcement learning
CN115033892A (en) Component vulnerability analysis method and device, electronic equipment and storage medium
CN114841664A (en) Method and device for determining multitasking sequence
Bartels et al. Verification of distributed embedded real-time systems and their low-level implementations using timed CSP
Ireland et al. Invariant patterns for program reasoning
Jiang et al. An exploitability analysis technique for binary vulnerability based on automatic exception suppression
CN115296896B (en) Attack path dynamic generation method and device and electronic equipment
CN115794658B (en) Fuzzy test method and system for block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant