CN109117364A - A kind of object-oriented method for generating test case and system - Google Patents
A kind of object-oriented method for generating test case and system Download PDFInfo
- Publication number
- CN109117364A CN109117364A CN201810713776.6A CN201810713776A CN109117364A CN 109117364 A CN109117364 A CN 109117364A CN 201810713776 A CN201810713776 A CN 201810713776A CN 109117364 A CN109117364 A CN 109117364A
- Authority
- CN
- China
- Prior art keywords
- input
- node
- distance
- oriented
- branch
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3684—Test management for test design, e.g. generating new test cases
Abstract
The present invention provides a kind of object-oriented method for generating test case, and step includes: each node range-to-go on the CFG for calculate target program, which is a node or a line on CFG;Guiding fuzz testing is carried out according to this distance, if the input coverage goal, generates object-oriented test case, otherwise calls guiding semiology analysis;It is synchronized to the input that semiology analysis generates is oriented in the queue of guiding fuzz testing preferentially to make a variation, if the input coverage goal, generates object-oriented test case.The present invention will be oriented to fuzz testing and guiding semiology analysis combines, and not only having solved fuzz testing can not make a variation the scaling concern for meeting the limitation of Complex Constraints, but also can overcome the disadvantages that semiology analysis;Interactive strategy when more efficient guiding strategy and the two combination is devised simultaneously, improves object-oriented Test cases technology efficiency.
Description
Technical field
The present invention relates to field of software engineering, specially a kind of efficient object-oriented method for generating test case and it is
System.
Background technique
Software test is one important component of field of software engineering, and ensures the crucial skill of computer software quality
Art.Software testing technology mainly passes through the means that construction test case is used for operating system, that may be present in software to find
Defect.Therefore, software test highlights test case to the covering power of target program, and coverage rate is higher, and program is tested
It obtains more abundant.At the same time, how to generate suitable test case makes test that can pointedly cover specified target,
The crucial branch of one be increasingly becoming in software test research.The technology can be applied to multiple scenes, such as:
A) crash reappears: when user reports crash to manufacturer, manufacturer need to be according to known crash report come structure
It makes input and reappears collapse scene, and the input requirements can at least cover the sentence of triggering crash;
B) test case gain: when software upgrading, need to construct new test case realize to after update program it is complete
Whole test need to generate suitable test case as target newly to add code at this time;
C) static detection result verification: the potential loophole sentence for selecting static auditing tool to detect is target, and construction is corresponding
Input runtime verification whether necessary being loophole.
Existing Test cases technology technology includes grey box testing, semiology analysis, stain analysis etc., and to object-oriented
Test cases technology then adds Guidance on the basis of these technologies, to rapidly cover specified target, specifically includes that
(1) it is oriented to fuzz testing: is added in fuzz testing technical foundation of the tradition towards coverage rate to input and mesh
The distance between mark measurement, and variation relevant parameter is adjusted according to metric.However this strategy can not change fuzz testing
The limitation of itself is difficult to meet complicated constraint by variation, as magic number is checked.
(2) it is oriented to semiology analysis: adding a variety of strategies on the basis of conventional symbols execute, improve the efficiency of track search,
It is close including distance is explored, explored on the reachable slice of target, given with the backward symbol that function call chain is guidance
Higher weight of branch etc..However, these strategies can not still break through semiology analysis and be difficult to extend in the program of path-oriented complexity
Limitation and the technology itself there is also support the problems such as insufficient, solver ability is limited for library function.
Therefore, it presently, there are by the technology of fuzz testing and semiology analysis combination, for making up respective deficiency, however is somebody's turn to do
Technology is still to be not directly applicable object-oriented Test cases technology scene herein towards program high coverage rate.
To sum up, there is respectively limitation in existing object-oriented Test cases technology technology, cannot be quickly generated covering and refer to
The input to set the goal.
Summary of the invention
In order to overcome the shortcomings of that existing guiding fuzz testing meets ability to Complex Constraints, the present invention propose it is a kind of towards
The method for generating test case and system of target combine guiding fuzz testing and guiding semiology analysis, have both solved fuzzy survey
Try the scaling concern for meeting the limitation of Complex Constraints, and can overcome the disadvantages that semiology analysis that can not make a variation;It devises and more increases simultaneously
Interactive strategy when the guiding strategy and the two of effect combine, improves object-oriented Test cases technology efficiency.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of object-oriented method for generating test case, step include:
Calculate on the CFG (Control Flow Graph, i.e. controlling stream graph) of target program each node to target away from
From the target is a node or a line on CFG;
Guiding fuzz testing is carried out according to this distance, comprising:
For the fitness function of each input addition distance metric;
According to distance metric value, the variation frequency of input is arranged in the position of selection input in the queue;
If inputting coverage goal, object-oriented test case is generated;
If inputting non-coverage goal, and transmission range no longer reduces whithin a period of time, then calls guiding semiology analysis;
The guiding semiology analysis is executed using concolic, comprising:
It sorts to all untreated inputs according to distance, the input priority processing for adjusting the distance nearest;
The node that must be covered for coverage goal is preceding obligatory nodes, must before being constituted according to a series of preceding obligatory nodes
Through node sequence, selection needs the missing branch explored to start not cover with next if there is solution in the missing branch
The preceding obligatory nodes of lid is carry out semiology analysis to explore more multipath on the CFG after the beta pruning of target, otherwise punching is found in backtracking
Prominent branch, the branch for selecting the other side not conflict is explored;
It is synchronized to the input that semiology analysis generates is oriented in the queue of guiding fuzz testing preferentially to make a variation, if this is defeated
Enter coverage goal, then generates object-oriented test case.
Wherein, the method for the distance is calculated are as follows:
Calculating any node on the CFG of current function, to the distance db1 of a function call point, which, which is capable of calling, works as
Successor function of the preceding function on CG (Call Graph, i.e. calling figure);
Calculate CG on be called function arrive objective function distance df, and multiplication one coefficient x;
From function entrance range-to-go db2 on the CFG of calculating target function;
Entire target program from above-mentioned node range-to-go be db1+xdf+db2.
Wherein, the method for the position of selection input in the queue are as follows:
Using insertion sort, new input is inserted into queue currently variation input below by the position of distance-taxis;
After the every circle traversal of queue, whole sequence is carried out to input.
Wherein, the method for the variation frequency of input is set are as follows:
Transmission range is normalized, variation frequency is adjusted as follows according to normalized transmission range d:
As d=0, new variation frequency is 5 times originally;
As d=1, new variation frequency is 0.4 times originally;
As d=0.5, variation frequency is constant.
Wherein, the concolic execution is to execute rail in input to input record occurrence and symbol constraint simultaneously
The missing branch that do not walk is attempted to explore in mark, generates and covers the branch and its input of more multipath later.
Wherein, the range that missing branch is explored is: the farthest preceding obligatory nodes that cover of selection input energy and next
A node not covered as source node and mesh node, calculates the node set between this two node, as missing
The range that branch is explored.
A kind of object-oriented Test cases technology system (abbreviation PRA), including memory and processor, the memory are deposited
Computer program is stored up, which is configured as being executed by the processor, which includes for executing each step in the above method
Instruction.
A kind of computer readable storage medium storing computer program, the computer program include instruction, which works as
The server is made to execute each step in the above method when being executed by the processor of server.
Compared with prior art, the method for the present invention can be successfully generated more object-oriented tests in the same time
Use-case is generating the average time-consuming shorter of test case, and through experimental verification of the present invention, the Driller of the prior art averagely consumes
When be 3.7 times of the method for the present invention, the AFLGo time-consuming that is averaged is 2.3 times of the invention.
Detailed description of the invention
Fig. 1 is the specific implementation flow chart that the present invention generates object-oriented test case.
Fig. 2 is the Vean diagram for the difference branch number that PRA and Driller, AFLGo of the present invention are successfully generated input.
Specific embodiment
To enable features described above and advantage of the invention to be clearer and more comprehensible, it is described in detail below.
(1) Integral Thought of the fuzzy test method of guiding in the present invention are as follows: range-to-go degree is inputted by addition
Amount, gives the closer input of distance objective with higher variation weight.Specific strategy includes:
Distance metric: the present invention is using the method for calculating distance on CFG in function CG and several functions.For appointing
It anticipates a point, calculates in current function on CFG from this point to the distance db1 of a function call point, it is desirable that the point of invocation
It is capable of calling successor function of the current function on CG;Then calculate on CG be called function to objective function distance df,
And the coefficient (such as 20) of the distance one multiplication is given, carry out the influence power of distance between spread function;Finally in conjunction with objective function
From function entrance point range-to-go db2 in interior CFG.Three is added as in entire target program from above-mentioned node to target
Distance.
Adjustment variation weight: the present invention adjusts the weight of variation in terms of two, including input variation sequence and input become
Alien frequencies rate.For adjustment variation sequence, the present invention uses insertion sort to insert it into current when saving new input every time
The position of distance-taxis is pressed in variation input below, to can select preferentially to make a variation apart from nearest input in next time.But this plan
It slightly can not achieve queue global orderly, therefore the present invention can carry out whole sequence after the every circle traversal of queue to input, guarantee
Next circle still selects nearest preferential variation.For variation frequency is arranged, the present invention needs that preferentially transmission range is normalized
Then processing adjusts variation frequency using normalized cumulant.Its basic principle is: the input (minimum value) for being 0 for d, new to become
Alien frequencies rate is original 5 times;The input (maximum value) for being 1 for d, new variation frequency are original 0.4 times;For the 0.5 of d
It inputs (median), variation frequency remains unchanged.For this purpose, the present invention devises the piecewise function based on exponent arithmetic, such as
Shown in lower.
Wherein, n is original variation frequency, and n ' is new variation frequency, and d is the transmission range after normalization.
(2) present invention also uses distance as measurement index, that is, thinks to work as when by fuzz testing and semiology analysis combination
When transmission range no longer reduces whithin a period of time, Complex Constraints have been likely to occur in program, then have needed to come by semiology analysis
Breakthrough bottleneck.In the interaction with semiology analysis, the present invention can be ranked up input according to distance, and priority processing distance is recently
Input.
(3) basic skills that the guiding symbolic execution technique in the present invention uses is that concolic is executed, i.e., for one
Input record occurrence and symbol constraint simultaneously, (is denoted as missing for the other side branch that do not walk in input execution track
Branch) it attempts to explore, it generates input and covers the branch and its later more multipath.It considers and not all missing branch
Explore it is all significant to coverage goal, and at present crucial branch should be distance objective recently and the unsatisfied branch of input,
Therefore the present invention is added to guiding strategy when branching selection and symbol are explored on the basis of concolic is executed, specifically such as
Under:
Use the branching selection strategy based on preceding necessary sequence guidance: the present invention need to first calculate necessary for coverage goal
A series of nodes of covering, i.e., preceding obligatory nodes sequence.The farthest preceding obligatory nodes that cover of selection input energy and next
The node not covered for source node and mesh node, calculates the node set between this two o'clock, the model explored as branch
It encloses.That is, the node of only missing branch covering belongs within the scope of this, can just select to explore.And in heuristic process
In, the present invention also will limit within the scope of this, i.e., using next preceding obligatory nodes not covered as the beta pruning of target after
CFG on start further semiology analysis, formed and explored by the local path of transient target of next preceding obligatory nodes.
If if there is the constraint conflict of constraint and the addition of selection branch without solution, i.e., in path in the branch of selection, this hair
It is bright to abandon the branch, and be an attempt to backtracking and find on path with its conflicting constraint, then selects the other side and newly add
The branch that addition of constraints does not conflict goes to explore, to bypass inappeasable constraint bottleneck.
For the method for the present invention, it is exemplified below an application example, Fig. 1 is its flow chart, specific as follows:
Step 1: a known program P and target T (target is generally a node or a line on program CFG), first
The distance between each node and target on CFG are first calculated, is saved into file;Then creation is oriented to fuzzy test process,
Including: to each input addition distance metric as fitness function, the position according to metric selection input in the queue
Set, according to metric setting variation frequency, operation monitoring input whether coverage goal, illustrate to give birth to if inputting coverage goal
(i.e. object-oriented test case) is inputted at target, entire task is completed.
Step 2: judging whether transmission range restrains in fuzz testing at regular intervals, that is, judge defeated in each period
It is lower to enter a distance average whether relatively upper period.If lower, illustrating, which can also continue to, makes a variation;If no longer reducing, then it is assumed that
Distance no longer restrains, and call sign is needed to execute;When call sign executes, and to all untreated inputs according to distance
Sort ascending, apart from nearest input priority processing (see the interaction 1 of Fig. 1).
Step 3: needing to explore according to preceding necessary sequence guidance selection in some input concolic implementation procedure
Missing branch.If there is solution in branch, start beta pruning semiology analysis, explores more multipath;If branch answers without solution
With branch's Backtracking Strategy, finds conflict branch and negate exploration.Often distance objective is closer for the input generated due to semiology analysis
Input, these inputs are synchronized in fuzz testing queue, usually lead to quickly make a variation, accelerate whole input life
At efficiency (see the interaction 2 of Fig. 1).
Beneficial effect to illustrate the invention, then tested as follows:
126 programs in cyber-defence match CGC that present invention experiment is held using DAPRA are as data set, each
Program has former and later two versions of patch.Carry out Test cases technology experiment by target of newly added patch code, thus altogether
Identify 254 targets.Vean diagram as shown in Figure 2, by PRA and it is existing be oriented to fuzzy measuring technology represent AFLGo and
The technology that fuzz testing and semiology analysis combine is represented Driller to compare, each target tests 8 hours, with this
Verify the effect of guiding strategy and interactive strategy of the invention.
Experimental result: as shown in Fig. 2, 100 are successfully generated branch's number of input for PRA, Driller, AFLGo three;
20 be the only successful branch's number of PRA;The 1 of surface is branch's number (i.e. Driller and AFLGo are successful) of only PRA failure;It is left
The 1 of top is the only successful branch's number of Driller;16 be branch's number of PRA, Driller success and AFLGo failure;0 is only
The successful branch's number of AFLGo;7 be branch's number of PRA, AFLGo success but Driller failure.As it can be seen that PRA can be in 8 hours
Generate test cases for 143 targets, average input generate the time be 41 points 47 seconds;Driller can succeed 118 targets;
AFLGo can only succeed 108.Wherein, PRA can almost cover Driller and AFLGo successfully all targets, while can also volume
It is outer generate 20 they all do not cover.Target successful for three counts its average time-consuming.PRA average time is
17 points 16 seconds;3 points of average time-consuming 1 hour of Driller 27 seconds, be 3.7 times of PRA;AFLGo it is average time-consuming 40 points 10 seconds, be PRA
2.3 times.It can be seen that guiding method for generating test case proposed by the present invention, than existing methods in operational efficiency and successfully
It is obviously improved in quantity.
Claims (8)
1. a kind of object-oriented method for generating test case, step include:
Each node range-to-go on the CFG of target program is calculated, which is a node or a line on CFG;
Guiding fuzz testing is carried out according to this distance, comprising:
For the fitness function of each input addition distance metric;
According to distance metric value, the variation frequency of input is arranged in the position of selection input in the queue;
If inputting coverage goal, object-oriented test case is generated;
If inputting non-coverage goal, and transmission range no longer reduces whithin a period of time, then calls guiding semiology analysis;
The guiding semiology analysis is executed using concolic, comprising:
It sorts to all untreated inputs according to distance, the input priority processing for adjusting the distance nearest;
The node that must be covered for coverage goal is preceding obligatory nodes, a series of necessary knot before being constituted according to preceding obligatory nodes
Point sequence, selection need the missing branch explored to start if there is solution in the missing branch with next unlapped
Preceding obligatory nodes is carry out semiology analysis to explore more multipath on the CFG after the beta pruning of target, otherwise conflict point is found in backtracking
Branch, the branch for selecting the other side not conflict is explored;
It is synchronized to the input that semiology analysis generates is oriented in the queue of guiding fuzz testing preferentially to make a variation, if the input is covered
Lid target then generates object-oriented test case.
2. the method as described in claim 1, which is characterized in that the method for calculating the distance are as follows:
Calculating any node on the CFG of current function, to the distance db1 of a function call point, which is capable of calling current letter
Successor function of the number on CG;
Calculate CG on be called function arrive objective function distance df, and multiplication one coefficient x;
From function entrance range-to-go db2 on the CFG of calculating target function;
Entire target program from above-mentioned node range-to-go be db1+xdf+db2.
3. the method as described in claim 1, which is characterized in that the method for the position of selection input in the queue are as follows:
Using insertion sort, new input is inserted into queue currently variation input below by the position of distance-taxis;
After the every circle traversal of queue, whole sequence is carried out to input.
4. the method as described in claim 1, which is characterized in that the method for the variation frequency of input is arranged are as follows:
Transmission range is normalized, variation frequency is adjusted as follows according to normalized transmission range d:
As d=0, new variation frequency is 5 times originally;
As d=1, new variation frequency is 0.4 times originally;
As d=0.5, variation frequency is constant.
5. the method as described in claim 1, which is characterized in that the concolic execution is to an input while to record specific
Value and symbol constraint, attempt to explore in input execution track for the missing branch do not walked, generate cover the branch and its
The input of more multipath later.
6. the method as described in claim 1, which is characterized in that the range that the missing branch is explored is: selection input energy
The farthest preceding obligatory nodes and next node not covered covered as source node and mesh node, calculate this two
Node set between node, the range explored as missing branch.
7. a kind of object-oriented Test cases technology system, including memory and processor, which stores computer journey
Sequence, the program are configured as being executed by the processor, which includes for executing any the method for the claims 1-6
In each step instruction.
8. it is a kind of store computer program computer readable storage medium, the computer program include instruction, the instruction when by
The processor of server makes the server execute each step in any the method for the claims 1-6 when executing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810713776.6A CN109117364B (en) | 2018-07-03 | 2018-07-03 | Target-oriented test case generation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810713776.6A CN109117364B (en) | 2018-07-03 | 2018-07-03 | Target-oriented test case generation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109117364A true CN109117364A (en) | 2019-01-01 |
CN109117364B CN109117364B (en) | 2021-06-15 |
Family
ID=64822552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810713776.6A Active CN109117364B (en) | 2018-07-03 | 2018-07-03 | Target-oriented test case generation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109117364B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111191245A (en) * | 2019-12-24 | 2020-05-22 | 中国人民解放军战略支援部队信息工程大学 | Fuzzy test method based on path perception variation strategy |
CN111563040A (en) * | 2020-05-08 | 2020-08-21 | 中国工商银行股份有限公司 | Block chain intelligent contract code testing method and device |
CN111897733A (en) * | 2020-08-07 | 2020-11-06 | 北京理工大学 | Fuzzy test method and device based on minimum set coverage |
CN112052166A (en) * | 2020-08-26 | 2020-12-08 | 河海大学 | Test case generation method and device based on domination relationship |
CN112416800A (en) * | 2020-12-03 | 2021-02-26 | 网易(杭州)网络有限公司 | Intelligent contract testing method, device, equipment and storage medium |
CN113569252A (en) * | 2021-07-07 | 2021-10-29 | 四川省信息安全测评中心 | Vulnerability detection method based on function and branch coverage by combining neural network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360334A (en) * | 2011-10-17 | 2012-02-22 | 中国人民解放军信息工程大学 | Dynamic and static combined software security test method |
US8387018B2 (en) * | 2010-09-01 | 2013-02-26 | International Business Machines Corporation | Fault localization using directed test generation |
US8869110B2 (en) * | 2008-02-11 | 2014-10-21 | Codenomicon Oy | Method and arrangement for test case creation |
CN105740149A (en) * | 2016-01-29 | 2016-07-06 | 中国人民解放军信息工程大学 | Software security detection method based on combination of vulnerability model and symbolic execution |
US20160239407A1 (en) * | 2015-02-18 | 2016-08-18 | Google Inc. | Small scale integration test generation |
-
2018
- 2018-07-03 CN CN201810713776.6A patent/CN109117364B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8869110B2 (en) * | 2008-02-11 | 2014-10-21 | Codenomicon Oy | Method and arrangement for test case creation |
US8387018B2 (en) * | 2010-09-01 | 2013-02-26 | International Business Machines Corporation | Fault localization using directed test generation |
CN102360334A (en) * | 2011-10-17 | 2012-02-22 | 中国人民解放军信息工程大学 | Dynamic and static combined software security test method |
US20160239407A1 (en) * | 2015-02-18 | 2016-08-18 | Google Inc. | Small scale integration test generation |
CN105740149A (en) * | 2016-01-29 | 2016-07-06 | 中国人民解放军信息工程大学 | Software security detection method based on combination of vulnerability model and symbolic execution |
Non-Patent Citations (1)
Title |
---|
李红辉等: "模糊测试技术研究", 《中国科学》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111191245A (en) * | 2019-12-24 | 2020-05-22 | 中国人民解放军战略支援部队信息工程大学 | Fuzzy test method based on path perception variation strategy |
CN111191245B (en) * | 2019-12-24 | 2022-06-17 | 中国人民解放军战略支援部队信息工程大学 | Fuzzy test method based on path perception mutation strategy |
CN111563040A (en) * | 2020-05-08 | 2020-08-21 | 中国工商银行股份有限公司 | Block chain intelligent contract code testing method and device |
CN111563040B (en) * | 2020-05-08 | 2023-08-15 | 中国工商银行股份有限公司 | Block chain intelligent contract code testing method and device |
CN111897733A (en) * | 2020-08-07 | 2020-11-06 | 北京理工大学 | Fuzzy test method and device based on minimum set coverage |
CN111897733B (en) * | 2020-08-07 | 2023-04-07 | 北京理工大学 | Fuzzy test method and device based on minimum set coverage |
CN112052166A (en) * | 2020-08-26 | 2020-12-08 | 河海大学 | Test case generation method and device based on domination relationship |
CN112416800A (en) * | 2020-12-03 | 2021-02-26 | 网易(杭州)网络有限公司 | Intelligent contract testing method, device, equipment and storage medium |
CN112416800B (en) * | 2020-12-03 | 2023-09-15 | 网易(杭州)网络有限公司 | Intelligent contract testing method, device, equipment and storage medium |
CN113569252A (en) * | 2021-07-07 | 2021-10-29 | 四川省信息安全测评中心 | Vulnerability detection method based on function and branch coverage by combining neural network |
Also Published As
Publication number | Publication date |
---|---|
CN109117364B (en) | 2021-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109117364A (en) | A kind of object-oriented method for generating test case and system | |
CN103116540B (en) | Dynamic symbolic execution method based on overall situation super block dominator graph | |
US8312440B2 (en) | Method, computer program product, and hardware product for providing program individuality analysis for source code programs | |
US8789054B2 (en) | Scheduling policy for efficient parallelization of software analysis in a distributed computing environment | |
US8769500B2 (en) | Node computation initialization technique for efficient parallelization of software analysis in a distributed computing environment | |
CN105868626B (en) | The method of monitoring software business conduct based on control stream coarseness integrality | |
US8914775B2 (en) | Dynamic and intelligent partial computation management for efficient parallelization of software analysis in a distributed computing environment | |
CN110471652A (en) | Task method of combination, composer, equipment and readable storage medium storing program for executing | |
CN112765031A (en) | Decomposition method of crowd-sourcing vulnerability mining task | |
Schmidt et al. | An automatic architecture reconstruction and refactoring framework | |
US8539500B2 (en) | Efficient partial execution for the parallelization of software analysis in a distributed computing environment | |
CN112860545B (en) | Software defect detection method and device | |
CN110222243A (en) | Determine the method, apparatus and storage medium of abnormal behaviour | |
CN104461864A (en) | Java source code defect detecting method and system based on Eclipse plugin | |
Chen et al. | Exploiting branch constraints without exhaustive path enumeration | |
CN110069347A (en) | A kind of thread dividing method of Kernel-based methods different degree | |
Li et al. | Soncraft: A tool for construction, simulation, and analysis of structured occurrence nets | |
CN114462043A (en) | Java anti-serialization vulnerability detection system and method based on reinforcement learning | |
CN115033892A (en) | Component vulnerability analysis method and device, electronic equipment and storage medium | |
CN114841664A (en) | Method and device for determining multitasking sequence | |
Bartels et al. | Verification of distributed embedded real-time systems and their low-level implementations using timed CSP | |
Ireland et al. | Invariant patterns for program reasoning | |
Jiang et al. | An exploitability analysis technique for binary vulnerability based on automatic exception suppression | |
CN115296896B (en) | Attack path dynamic generation method and device and electronic equipment | |
CN115794658B (en) | Fuzzy test method and system for block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |