CN109491897A - A kind of system resource leak testing method based on trend analysis - Google Patents

A kind of system resource leak testing method based on trend analysis Download PDF

Info

Publication number
CN109491897A
CN109491897A CN201811259823.0A CN201811259823A CN109491897A CN 109491897 A CN109491897 A CN 109491897A CN 201811259823 A CN201811259823 A CN 201811259823A CN 109491897 A CN109491897 A CN 109491897A
Authority
CN
China
Prior art keywords
data
script
resource
system resource
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811259823.0A
Other languages
Chinese (zh)
Inventor
黄青霞
刘韬
范渊
吴永越
郑学新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu DBAPPSecurity Co Ltd
Original Assignee
Chengdu DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu DBAPPSecurity Co Ltd filed Critical Chengdu DBAPPSecurity Co Ltd
Priority to CN201811259823.0A priority Critical patent/CN109491897A/en
Publication of CN109491897A publication Critical patent/CN109491897A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/366Software debugging using diagnostics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3636Software debugging by tracing the execution of the program

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of the system resource leak testing method based on trend analysis, dependence linux system tool sar sampling collection data;According to the memory file under time interval periodic scan system/proc catalogue of setting, data needed for sampling obtains simultaneously save as .json file;Operation data shows that script load json file reads data, and carries out visualization processing to obtained data to realize graphical representation resource consumption trend;If the stock number that the program of detection occupies is continuously in propradation and never has a declining tendency, judge that this program causes system resource leakage.The present invention, which can be detected by trend analysis at leakage initial stage, to go wrong, while currently invention addresses all processes run in whole system;The present invention realize the leakage of timely diagnostic resource and can the position that is occurred of memory leak positioning, facilitate later maintenance, there is preferable practicability.

Description

A kind of system resource leak testing method based on trend analysis
Technical field
The invention belongs to the technical fields of system resource leak detection, and in particular to a kind of system money based on trend analysis Source leak testing method.
Background technique
System resource means what any entity that its operational capability is limited in a computer system either virtually formed Element.When process is run, need for its distributing system resource.System resource leakage also occurs often.It is with memory overflow below Example is described in detail.
Memory overflow is frequently problem in software development, as shown in Figure 1, being dynamically allocated in program process Memory space for some reason after program finishes execution without release or can not discharge, cause this section of memory that cannot be grasped Make system recycling and reusing, this has resulted in memory overflow.Memory overflow defect has the feature of concealment, accumulation property, than it He is more difficult to detect memory unauthorized access mistake.Because the producing cause of memory overflow is that memory block is not released, belong to omission type Defect rather than cross shift defect.
In addition, memory overflow usually will not directly generate the wrong symptom of observable, but gradually accumulate, it is whole to reduce system Body performance, short time a small amount of memory overflow are easy ignored, and over time, the memory of leakage is more and more, can Memory is fewer and fewer, when memory overflow accumulation to a certain extent after, light then performance impairment, heavy then system crash.Do not limit to It occupies in memory overflow, including cpu, open other system resources such as number of files, disk space occupancy also similarly.
Summary of the invention
The purpose of the present invention is to provide a kind of system resource leak testing method based on trend analysis, the present invention can Can be detected and be gone wrong at leakage initial stage by trend analysis, at the same currently invention addresses run in whole system it is all into Journey;If the stock number that the program of detection occupies is continuously in propradation and never has a declining tendency, this program is judged Cause system resource leakage, the present invention realizes the leakage of timely diagnostic resource and being capable of the position that is occurred of memory leak positioning It sets, facilitates later maintenance, there is preferable practicability.
It is conceived to all processes run in whole system, has its resource of the process of resource leakage problem must after a period of time Surely continuous upward trend can be showed or occupy the far super normal range (NR) of resource, it can be to generation resource leakage according to this characteristic Process carries out screening investigation.
The present invention is achieved through the following technical solutions: a kind of system resource leak-testing side based on trend analysis Method relies on linux system tool sar sampling and collects data;According to time interval periodic scan system/proc catalogue of setting Under memory file, sampling obtain needed for data simultaneously save as .json file;Operation data shows that script load json file is read Access evidence, and visualization processing is carried out to realize graphical representation resource consumption trend to obtained data;If the program of detection The stock number of occupancy is continuously in propradation and never has a declining tendency, then judges that this program causes system resource and lets out Leakage.
In order to preferably realize the present invention, further, the data of collection include the data of process consumption CPU/MEM, beat The file/folder opened occupies the data of disk space and network interface card reception each second/transmission data packet/byte number, per second Clock reception/the compressed data packets of transmission, received multicast packets each second data.
In order to preferably realize the present invention, further, sar data collection by one two in/usr/lib/sa into Executable file processed and two scripts are completed, and wherein sa1, sa2 are script, sadc is binary executable;The sa1 It is to call sadc by performance data collection to a Shell script in binary log file;The sa2 be by the same day two into The storage of all data is to another Shell script of text file in file processed, and then it will be removed all within seven days Journal file.
In order to preferably realize the present invention, further, between the time of the customized collection system resource situation data of user Every with occupy the highest target individual number of resource ratio;It is checked in the period by operation show-info.py script and is collected in total Data information.
In order to preferably realize the present invention, further, matplotlib the and tkinter module pair dependent on python Obtained data carry out visualization processing, realize graphical representation resource consumption trend.
It, further, can be by increasing physical machine quantity or identical in order to preferably verify function of the invention The problem of physical machine is divided into more virtual machines to run this means to reappear system resource leakage, to play acceleration problem The effect of reproduction reduces the time loss for reappearing resource leakage problem under normal circumstances.
The display systems resource consumption trend in the form of line illustration may be implemented in the present invention, including process consumes CPU or interior It deposits trend, open file/folder occupancy disk trend and network interface card traffic trends.Specifically by taking Memory leakage detection as an example, this Invention script separates data collection and figure displaying, and user's operational data collection script is simultaneously arranged between data collection time Every parameter, script will be collected data automatically according to set time interval and is stored in file, when user needs to look into When seeing resource consumption trend, show that script collected data will be shown before by operation figure.User passes through sight Examining process committed memory amount shown in tendency chart, whether sustainable growth is to determine whether occur memory overflow, and can position The position that memory overflow is occurred.
For the probability resource leakage problem occurred, the maximum difficult point solved the problems, such as is that problem does not reappear, so needing Increase the probability of problem repetition, can by increase physical machine quantity or identical physical machine be divided into more virtual machines come Logic of the invention is run, to play the role of acceleration problem reproduction, reduces the time loss of test reproduction problem.
Main method of the present invention is to rely on linux system tool sar to be sampled collection data to current system conditions. Sar data collection is completed by a binary executable in/usr/lib/sa and two scripts.Sar data are received Storage is one and is located at/the binary executable of usr/lib/sa/sadc.Sa1, sa2 are script, and sadc is that binary system can Execute file.First script sa1 is to call sadc by performance data collection a to Shell in binary log file Script.Sa1 order also ensures all uses different files daily.Second script sa2 is by institute in same day binary file Some data storages are to another Shell script of text file, and then it will remove all journal files within seven days.This Different script files collects different data in invention, the corresponding data such as the following table 1 collected of specific script:
Table 1
For the data for specifically needing to obtain, can be obtained in Run Script by the way that corresponding parameter is arranged, parameter is situated between It continues such as the following table 2:
Table 2
For the data being collected into, it will it is automatically saved in the file in the file directory where script, it is subsequent to lead to It crosses operation data and shows script, and matplotlib the and tkinter module dependent on python carries out obtained data Visualization processing realizes graphical representation resource consumption trend.According to the displaying of figure, when the resource for finding that some program occupies Amount is continuously in propradation and never has a declining tendency, then illustrates that this program may not discharge after being finished every time Fall the resource of its occupancy, therefore may determine that this program may cause system resource leakage.
The method of system resource leak-testing based on trend analysis includes at least following steps:
1. the parameter of the data obtained needed for setting and the time interval parameter for collecting data.
2. being adopted according to the memory file under parameter and time interval timed periodic scanning system/proc catalogue of setting Data needed for sample obtains simultaneously save as .json file.
3. operation data shows that script load json file reads data, and is depicted as Line Chart.
4. the system resource situation shown according to Line Chart, analyses whether to produce resource leakage.
It is an advantage of the current invention that data collection is separated with visualization, after setting time interval parameter, data collection Script can be in system background continuous service, and I/O load is small.User only needs according to their own needs every a period of time operation data Show script i.e. it can be seen that Expenditure Levels and trend of the system resource within the period of script collection data.For passing through analysis Tendency chart is done sth. in advance to expose the program for having system resource to leak, and can take corresponding measure in time, can effectively prevent because of system resource Caused by leakage performance impairment even system crash the problem of.
Beneficial effects of the present invention:
(1) it relies on linux system tool sar sampling and collects data;According to the time interval periodic scan system of setting/ Memory file under proc catalogue, data needed for sampling obtains simultaneously save as .json file;Operation data shows script load Json file reads data, and carries out visualization processing to obtained data to realize graphical representation resource consumption trend;If The stock number that the program of detection occupies is continuously in propradation and never has a declining tendency, then judges that this program causes System resource leakage.The present invention, which can be detected by trend analysis at leakage initial stage, to go wrong, while currently invention addresses All processes run in whole system;If the stock number that the program of detection occupies is continuously in propradation and never has decline Trend, then judge that this program causes system resource leakage, the present invention realizes the leakage of timely diagnostic resource and can The position that memory leak positioning is occurred, facilitates later maintenance, has preferable practicability.
(2) sar data collection is by a binary executable in/usr/lib/sa and two scripts come complete At wherein sa1, sa2 are script, and sadc is binary executable;The sa1 is that sadc is called to arrive performance data collection A Shell script in binary log file;The sa2 is by data storage all in same day binary file to text Another Shell script of this document, then it will remove all journal files within seven days.Data collection foot of the invention Originally can be in system background continuous service, and I/O load is small, has preferable practicability.
(3) visualization processing is carried out to obtained data dependent on matplotlib the and tkinter module of python, it is real Existing graphical representation resource consumption trend.The present invention separates data collection with visualization, after setting time interval parameter, number It can not need artificially constantly to stare at system resource situation data, facilitate user in system background continuous service according to script is collected It uses, and I/O load is small.
Detailed description of the invention
Fig. 1 is Memory leakage detection work flow diagram;
Fig. 2 is workflow block diagram of the invention;
Fig. 3 is the principle of the present invention block diagram.
Specific embodiment
Embodiment 1:
A kind of system resource leak testing method based on trend analysis, as shown in figure 3, relying on linux system tool sar Data are collected in sampling;According to the memory file under time interval periodic scan system/proc catalogue of setting, sampling obtains institute It needs data and saves as .json file;Operation data show script load json file read data, and to obtained data into Row visualization processing is to realize graphical representation resource consumption trend;If the stock number that the program of detection occupies is continuously in rising It state and never has a declining tendency, then judges that this program causes system resource leakage.
As shown in Figure 1, process 2 and process 3 after abnormal free system resources, cause these resources still occupied With therefore can not be by operating system recycling and reusing, therefore resource leakage problem be produced.When process 2 and process 3 are held again When row, still can application system resource, will show as representing at this time in resource consumption tendency chart of the invention process 2 and into The curve of journey 3, which is in, continues propradation.
The present invention, which can be detected by trend analysis at leakage initial stage, to go wrong, while currently invention addresses entire systems All processes run in system;If the stock number that the program of detection occupies is continuously in propradation and never has becoming for decline Gesture then judges that this program causes system resource leakage, and the present invention realizes timely diagnostic resource and reveals and can position The position that memory overflow is occurred, facilitates later maintenance, has preferable practicability.
Embodiment 2:
The present embodiment is to optimize on the basis of embodiment 1, as shown in Fig. 2, being not limited to process consumption CPU/MEM Data, the data of collection further include open file/folder occupy the data of disk space and receive network interface card each second/ Data packet/byte number of transmission, the reception each second/compressed data packets of transmission, received multicast packets each second data.
Sar data collection is completed by a binary executable in/usr/lib/sa and two scripts, Middle sa1, sa2 are script, and sadc is binary executable;The sa1 be call sadc by performance data collection to two into A Shell script in journal file processed;The sa2 is by data storage all in same day binary file to text text Another Shell script of part, then it will remove all journal files within seven days.Script can be set every 600 seconds The data of an occupied situation of memory are collected, and records and occupies most preceding 10 processes of resource;By running show- Info.py script checks the data information collected in total in the period.
When whether the memory for needing to monitor system leaks, the present invention is run in system background first
TendencyChart-cpuOrMem.py script;Such as
10-t 600 of python tendencyChart-cpuOrMem.py-c mem-n indicates that script was received every 600 seconds Collect the occupied situation data of a memory, and records and occupy most preceding 10 processes of resource.
Then after a period of time, such as two days.It can remove to check over collected data information in two days at this time.Fortune Row show-info.py script.Realize that figure is shown.
It is an advantage of the current invention that data collection is separated with visualization, after setting time interval parameter, data collection Script can be in system background continuous service, and I/O load is small.User only needs according to their own needs every a period of time operation data Show script i.e. it can be seen that Expenditure Levels and trend of the system resource within the period of script collection data.For passing through analysis Tendency chart is done sth. in advance to expose the program for having system resource to leak, and can take corresponding measure in time, can effectively prevent because of system resource Caused by leakage performance impairment even system crash the problem of.
The other parts of the present embodiment are same as Example 1, and so it will not be repeated.
Embodiment 3:
The present embodiment is optimized on the basis of embodiment 1 or 2, and the network interface card traffic trends situation of system is monitored.With Family first runs tendencyChart-netflow.py script in system background;Such as
Python tendencyChart-netflow.py-n ens33-n eth1--rp--tp-t 3600 indicates script The data packet situation that an ens33 network interface cards and eth1 network interface card send and receive each second was collected every 3600 seconds.After a period of time, It runs show-info.py script and realizes that figure is shown.When the data packet for representing some network interface card each second of transmission in discovery tendency chart When showing abnormal state of affairs with received data packet curve, it can determine whether that this network interface card there is a problem.
It is an advantage of the current invention that data collection is separated with visualization, after setting time interval parameter, data collection Script can be in system background continuous service, and I/O load is small.User only needs according to their own needs every a period of time operation data Show script i.e. it can be seen that Expenditure Levels and trend of the system resource within the period of script collection data.For passing through analysis Tendency chart is done sth. in advance to expose the program for having system resource to leak and go wrong, and can take corresponding measure in time, can effectively prevent Because system resource leakage caused by performance impairment even system crash the problem of.
The other parts of the present embodiment are identical as above-described embodiment 1 or 2, and so it will not be repeated.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, it is all according to According to technical spirit any simple modification to the above embodiments of the invention, equivalent variations, protection of the invention is each fallen within Within the scope of.

Claims (5)

1. a kind of system resource leak testing method based on trend analysis, which is characterized in that rely on linux system tool sar Data are collected in sampling;According to the memory file under time interval periodic scan system/proc catalogue of setting, sampling obtains institute It needs data and saves as .json file;Operation data show script load json file read data, and to obtained data into Row visualization processing is to realize graphical representation resource consumption trend;If the stock number that the program of detection occupies is continuously in rising It state and never has a declining tendency, then judges that this program causes system resource leakage.
2. a kind of system resource leak testing method based on trend analysis according to claim 1, which is characterized in that receive The data of collection include the data and network interface card of the file/folder occupancy disk space of the data of process consumption CPU/MEM, opening Reception each second/transmission data packet/byte number, the reception each second/compressed data packets of transmission, received multicast number each second According to the data of packet.
3. a kind of system resource leak testing method based on trend analysis according to claim 2, which is characterized in that Sar data collection is completed by a binary executable in/usr/lib/sa and two scripts, wherein sa1, Sa2 is script, and sadc is binary executable;The sa1 is to call sadc by performance data collection to binary log A Shell script in file;The sa2 is by data storage all in same day binary file to the another of text file One Shell script, then it will remove all journal files within seven days.
4. a kind of system resource leak testing method based on trend analysis according to claim 2, which is characterized in that use The time interval and the occupancy highest target individual number of resource ratio of the customized collection system resource situation data in family;Pass through operation Show-info.py script checks the data information collected in total in the period.
5. a kind of system resource leak testing method based on trend analysis according to claim 1-4, special Sign is that matplotlib the and tkinter module dependent on python carries out visualization processing to obtained data, realizes figure Shape showing resource consumes trend.
CN201811259823.0A 2018-10-26 2018-10-26 A kind of system resource leak testing method based on trend analysis Pending CN109491897A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811259823.0A CN109491897A (en) 2018-10-26 2018-10-26 A kind of system resource leak testing method based on trend analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811259823.0A CN109491897A (en) 2018-10-26 2018-10-26 A kind of system resource leak testing method based on trend analysis

Publications (1)

Publication Number Publication Date
CN109491897A true CN109491897A (en) 2019-03-19

Family

ID=65693162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811259823.0A Pending CN109491897A (en) 2018-10-26 2018-10-26 A kind of system resource leak testing method based on trend analysis

Country Status (1)

Country Link
CN (1) CN109491897A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124820A (en) * 2019-12-13 2020-05-08 郑州威科姆科技股份有限公司 Method for realizing off-line monitoring and analysis of operating system and process resources
CN111984541A (en) * 2020-08-31 2020-11-24 北京达佳互联信息技术有限公司 Memory leak detection method and device and terminal
CN112631941A (en) * 2020-12-31 2021-04-09 广州鲁邦通物联网科技有限公司 Method and system for locating linux kernel slub memory leakage
CN113076247A (en) * 2021-04-06 2021-07-06 成都安恒信息技术有限公司 Method and system for managing and running test script
WO2022105685A1 (en) * 2020-11-17 2022-05-27 中兴通讯股份有限公司 Memory management method and device for optical transmission device, and storage medium
CN115794476A (en) * 2023-02-01 2023-03-14 荣耀终端有限公司 Processing method of kernel graphic system layer memory and terminal equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110276949A1 (en) * 2010-05-04 2011-11-10 Oracle International Corporation Memory leak detection
CN103327278A (en) * 2013-07-10 2013-09-25 亿览在线网络技术(北京)有限公司 Real time sharing method and device of images
CN104866409A (en) * 2015-05-29 2015-08-26 小米科技有限责任公司 Method and apparatus for monitoring memory leakage
CN105204996A (en) * 2015-09-24 2015-12-30 努比亚技术有限公司 Memory leak detection device and method and terminal
CN105208098A (en) * 2015-08-24 2015-12-30 用友网络科技股份有限公司 Cloud monitoring system realization device and method
CN105224433A (en) * 2014-06-23 2016-01-06 阿里巴巴集团控股有限公司 A kind of internal memory monitoring method and server
CN107346285A (en) * 2017-05-26 2017-11-14 郑州云海信息技术有限公司 A kind of method for detecting memory leakage and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110276949A1 (en) * 2010-05-04 2011-11-10 Oracle International Corporation Memory leak detection
CN103327278A (en) * 2013-07-10 2013-09-25 亿览在线网络技术(北京)有限公司 Real time sharing method and device of images
CN105224433A (en) * 2014-06-23 2016-01-06 阿里巴巴集团控股有限公司 A kind of internal memory monitoring method and server
CN104866409A (en) * 2015-05-29 2015-08-26 小米科技有限责任公司 Method and apparatus for monitoring memory leakage
CN105208098A (en) * 2015-08-24 2015-12-30 用友网络科技股份有限公司 Cloud monitoring system realization device and method
CN105204996A (en) * 2015-09-24 2015-12-30 努比亚技术有限公司 Memory leak detection device and method and terminal
CN107346285A (en) * 2017-05-26 2017-11-14 郑州云海信息技术有限公司 A kind of method for detecting memory leakage and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蒋建春 等: "《计算机网络管理理论与实践教程》", 30 September 2008, 北京邮电学院出版社 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124820A (en) * 2019-12-13 2020-05-08 郑州威科姆科技股份有限公司 Method for realizing off-line monitoring and analysis of operating system and process resources
CN111124820B (en) * 2019-12-13 2023-12-22 郑州威科姆科技股份有限公司 Method for realizing off-line monitoring and analysis of operating system and process resources
CN111984541A (en) * 2020-08-31 2020-11-24 北京达佳互联信息技术有限公司 Memory leak detection method and device and terminal
WO2022105685A1 (en) * 2020-11-17 2022-05-27 中兴通讯股份有限公司 Memory management method and device for optical transmission device, and storage medium
CN112631941A (en) * 2020-12-31 2021-04-09 广州鲁邦通物联网科技有限公司 Method and system for locating linux kernel slub memory leakage
CN113076247A (en) * 2021-04-06 2021-07-06 成都安恒信息技术有限公司 Method and system for managing and running test script
CN115794476A (en) * 2023-02-01 2023-03-14 荣耀终端有限公司 Processing method of kernel graphic system layer memory and terminal equipment

Similar Documents

Publication Publication Date Title
CN109491897A (en) A kind of system resource leak testing method based on trend analysis
US20200151330A1 (en) Counter-fraud operation management
CN109491990A (en) A kind of method of detection data quality and the device of detection data quality
CN105740707A (en) Malicious file identification method and device
CN107729210A (en) The abnormality diagnostic method and device of Distributed Services cluster
CN110390198B (en) Risk inspection method and device for small program and electronic equipment
CN107220121B (en) Sandbox environment testing method and system under NUMA architecture
CN104503910A (en) Product test method by monitoring users' using behavior
CN109495291B (en) Calling abnormity positioning method and device and server
CN102959519A (en) System test apparatus
CN109068132B (en) VBO display interface test method, device, equipment and storage medium
CN111782490A (en) Data acquisition method and device
CN103995807A (en) Massive data query and secondary processing method based on Web architecture
CN105022694A (en) Test case generation method and system for mobile terminal test
CN110662024A (en) Video quality diagnosis method and device based on multiple frames and electronic equipment
CN104063326A (en) Software testing data analysis oscilloscope and method
CN111209213A (en) Method, system, device and storage medium for detecting abnormity of application program during operation
CN107451038B (en) Hardware event acquisition method, processor and computing system
CN113704129A (en) Regression testing method, device, storage medium and equipment
Zheng et al. Anomaly localization in large-scale clusters
CN110992299B (en) Method and device for detecting browser compatibility
CN109767546B (en) Quality checking and scheduling device and quality checking and scheduling method for valuable bills
CN116645082A (en) System inspection method, device, equipment and storage medium
CN116642696A (en) Railway bearing health monitoring method, device, system, terminal and storage medium
Amankwah et al. Fast bug detection algorithm for identifying potential vulnerabilities in juliet test cases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190319

RJ01 Rejection of invention patent application after publication