WO2016085273A1 - Method for classifying alarm types in detecting source code error, computer program therefor, recording medium thereof - Google Patents
Method for classifying alarm types in detecting source code error, computer program therefor, recording medium thereof Download PDFInfo
- Publication number
- WO2016085273A1 WO2016085273A1 PCT/KR2015/012792 KR2015012792W WO2016085273A1 WO 2016085273 A1 WO2016085273 A1 WO 2016085273A1 KR 2015012792 W KR2015012792 W KR 2015012792W WO 2016085273 A1 WO2016085273 A1 WO 2016085273A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- alarm
- error detection
- equation
- source code
- node
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
Definitions
- the present invention relates to an alarm type classification method, a computer program, and a recording medium for detecting an error of a source code.
- the present invention relates to an alarm by automatically classifying and analyzing various types of alarms related to source codes generated from a static analyzer.
- the present invention relates to a method for classifying an alarm type, a computer program for the same, and a recording medium thereof, in error detection of source code to prevent waste of resources required for type classification.
- Static analyzers are widely used to detect potential bugs or vulnerabilities in source code.
- the static analyzer detects a predefined error for each checker by executing checkers for each function, and generates an alarm message for determining that the error is detected.
- a process of classifying an alarm type may be performed for the purpose of analyzing the accuracy of the generated alarm.
- the types of alarms can be classified and analyzed to further analyze or prepare for alarm types that have a high probability of false alarms.
- This type of classification was conventionally performed by a developer's manual work. Classifiers are a waste of resources.
- the present invention has been made in view of the above-mentioned conventional problems, and automatically classifies and analyzes various types of alarms related to source codes generated in a static analyzer, thereby preventing waste of resources required for alarm type classification. It is an object of the present invention to provide a method of classifying an alarm type, a computer program therefor, and a recording medium thereof, in detecting an error of source code.
- the present invention for achieving the above object, it is executed in the alarm type classification device interlocked with the static analyzer, a method for classifying the error detection alarm generated by the static analyzer for each type, 1) detection of the error occurred Receiving alarm path information regarding an alarm and source code information targeted for an alarm, wherein the alarm path information is information on an execution path related to the generated error detection alarm among execution paths of source code; 2) converting the source code into an abstract syntax tree (AST); 3) removing an unnecessary subtree not associated with the error detection alert from the abstract syntax tree; 4) obtaining a feature vector for the abstract syntax tree from which unnecessary subtrees have been removed based on a set of preset feature patterns; And 5) clustering the obtained feature vectors in a preset manner to classify the error detection alerts corresponding to the feature vectors by type.
- the method for classifying an alert type in error detection of the configured source code is disclosed.
- the present invention in step 1), further receives alarm type information (alarm types) for the error detection alarm has occurred-the alarm type information corresponds to any type of the alarm type of the error detection alarm generated in advance Information on whether the feature pattern is set in advance for the alarm type of the error detection alert.
- alarm type information alarm types
- the alarm type information corresponds to any type of the alarm type of the error detection alarm generated in advance Information on whether the feature pattern is set in advance for the alarm type of the error detection alert.
- the removal of the unnecessary subtree comprises a first policy for removing general syntax other than the syntax executed on the execution path associated with the error detection alert, and associated with the error detection alert.
- the feature pattern set is configured in the form of a set of n feature patterns, and the feature pattern includes: conditional statement generation, loop statement generation, return statement generation, break or continuation (continue) statement occurrence, exit or assert method invocation, null expression, comparisons with a null value, null assignment assignments) occurrence, or statement generation that returns a null value.
- the process of obtaining the feature vector V (R) for the abstract syntax tree from which the unnecessary subtree is removed is 401) Defining a feature pattern set P configured in the form of a set of feature patterns p;
- i th feature pattern (p i ) can be a single node or a subtree
- V (P, d 1 ) ... V (P, d m ) is a feature vector obtained through Equation 4 for the child nodes d 1 , ..., d m ,
- v (P, D) is an n-dimensional pattern satisfaction vector for any node D)
- Equation 5 obtaining a feature vector V (R) for the abstract syntax tree from which the unnecessary subtree is removed.
- the clustering is characterized by being performed by the K-means algorithm.
- a computer program is stored in a medium in combination with hardware to execute an alarm type classification method in error detection of the source code.
- a computer-readable recording medium having a computer program recorded thereon for executing an alarm type classification method in a computer in detecting an error of the source code is disclosed.
- the present invention in the error detection of the source code using the static analyzer, there is an advantage that it is possible to classify and analyze the occurrence type of the alarm, and to further analyze or prepare for the alarm type having a high probability of false alarm. .
- the type of alarm classification can be executed through an automatic process without performing by a developer's manual work, there is an advantage in that a waste of resources required for alarm type classification can be prevented.
- FIG. 1 is a conceptual diagram illustrating an alarm type classification method in error detection of source code according to an embodiment of the present invention.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component.
- FIG. 1 is a conceptual diagram illustrating an alarm type classification method in error detection of source code according to an embodiment of the present invention.
- the present invention is executed in an alarm type classification apparatus that interworks with a static analyzer, and is a method for classifying error detection alarms generated by a static analyzer by type.
- the alarm type classification device may be understood as a computing means for executing the alarm type classification method or a functional module thereof.
- the alarm type classification device may be implemented in the static analyzer in the form of an interlocking module or in the form of an internal module.
- the alarm type classification apparatus of this embodiment is interlocked with various known static analyzers.
- the static analyzer has been known a variety of commercial products of the grammar-based (Syntactic) analysis or semantic analysis method, the detailed description thereof will be omitted.
- the alarm type classification apparatus receives alarm path information regarding the generated error detection alarm and source code information that is the target of the alarm.
- the input may be based on an input request of an alarm type classification device or a setting of a static analyzer, and a static analyzer linked with the alarm type classification device may provide the respective information to the alarm type classification device, or in another example,
- the file in which each information is recorded may be made by a user inputting the alarm type classification device to be readable.
- the alarm path information is information about an execution path related to the generated error detection alarm among execution paths of source code.
- the static analyzer detects whether an analysis target source code is error based on a predetermined criterion for each checker by executing checkers for each function, and generates a specific alarm for determining that an error is detected.
- the alarm is made by outputting a specific alarm message preset to the checker with respect to the detected error.
- Each alert message is basically dependent on a specific checker, and generally does not reflect the nature or form of the source code, or features on the execution path.
- step S1 the alarm type classification apparatus is further received with alarm type information regarding the error detection alarm that has occurred.
- One 'alarm type' has the same alarm message. For example, one checker generates one alert message and can be understood to define one 'alarm type'.
- the 'alarm type' may include 'general null dereference', 'dereferencing of an unchecked null value', and 'dereferencing of a returned null value', and the like, and various alarm types may be set.
- a feature pattern set to be described below is defined for each alarm type.
- step S2 the alarm type classification apparatus converts the source code into an abstract syntax tree (AST).
- AST abstract syntax tree
- An abstract syntax tree is a tree of abstract syntax structures in source code written in a programming language, where each node represents a structure generated from the source code. Detailed concepts of the abstract syntax tree may be understood through a number of known materials, and thus detailed descriptions thereof will be omitted.
- step S3 the alert type classification apparatus removes an unnecessary subtree not associated with the error detection alert from the abstract syntax tree.
- Elimination of unnecessary subtrees can be accomplished by conventional rule-based techniques.
- the removal of the unnecessary subtree may include a first policy for removing general syntax other than the syntax executed on the execution path associated with the error detection alert, and a branch executed on the execution path associated with the error detection alert.
- step S4 the alert type classification apparatus obtains the feature vector for the abstract syntax tree from which the unnecessary subtree has been removed based on the preset feature pattern set.
- the abstract syntax tree (AST) obtained from the source code is too large and complex to use as input data for classification of alert types through clustering.
- the clustering processing time is reduced and the resource required for this is obtained.
- the feature pattern set is configured in the form of a set of n feature patterns preset, wherein the feature pattern is a condition statement generation, loop statement generation, return statement generation, break or continue statement generation, An exit or assert method invocation, a null expression, a comparison with a null value, a null assignments, a null value It can be any one of the occurrences of statements that return. This is summarized as follows.
- the feature pattern set i.e., the set of n feature patterns, is preset for each alert type of the error detection alert.
- the alarm type classification is made within the scope of one specific alarm type.
- step S4 a process of obtaining a feature vector V (R) for the abstract syntax tree from which the unnecessary subtree is removed is performed as follows.
- the alarm type classification apparatus defines a feature pattern set P configured in the form of a set of n feature patterns p, as shown in Equation 1 below.
- the alarm type classification apparatus defines an n-dimensional pattern satisfaction vector v (P, d) for any node d on the abstract syntax tree, as shown in Equation 2 below.
- i th feature pattern (p i ) can be a single node or a subtree
- the apparatus for classifying an alert type defines a feature vector V (P, D) for any node D on the abstract syntax tree, as shown in Equation 4 below.
- V (P, d 1 ) ... V (P, d m ) is a feature vector obtained through Equation 4 for the child nodes d 1 , ..., d m ,
- v (P, D) is an n-dimensional pattern satisfaction vector for any node D)
- the apparatus for classifying an alert type obtains a feature vector V (R) for the abstract syntax tree from which the unnecessary subtree is removed using Equation 5 below.
- Equation 5 may be understood as an arbitrary node D of Equation 4 obtained by inputting a root node R of the abstract syntax tree from which an unnecessary subtree is removed.
- the alarm type classification apparatus may cluster the obtained feature vector V (R) in a preset manner to classify the error detection alert corresponding to the feature vector by type.
- a known vector or data clustering technique may be used.
- a known hierarchical clustering technique or a non-hierarchical clustering technique may be used.
- K-means is a method of finding the centroid of a cluster by minimizing the Euclidean distance between the data (or vector) and the center of the cluster to which the data (or vector) belongs.
- the K-means algorithm has a simple structure and generally has a fast convergence property, it can be applied as a preferable example in this embodiment.
- feature vectors with high similarity may be classified into the same type, and as a result, respective error detection alerts corresponding to feature vectors classified into the same type may also be classified into the same type of alerts. For example, detailed conditions of similarity that may be classified into the same type may be preset in the alarm type classification device.
- This classification of alert types provides developers with several advantages in the analysis of error detection alerts.
- the developer first analyzes the error detection alarm first. May first determine whether or not a false alarm is present.
- Embodiments of the present invention include a program for performing various computer-implemented operations and a computer readable medium recording the same.
- the computer readable medium may include program instructions, data files, data structures, etc. alone or in combination.
- the media may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well-known and available to those having skill in the computer software arts.
- Examples of computer readable recording media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROM, DVD, USB drives, magnetic-optical media such as floppy disks, and ROM, RAM, Hardware devices specifically configured to store and execute program instructions, such as flash memory, are included.
- the medium may be a transmission medium such as an optical or metal wire, a waveguide, or the like including a carrier wave for transmitting a signal specifying a program command, a data structure, or the like.
- program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
Abstract
Description
구분division | 피처 패턴Feature pattern |
1One | 조건문 발생Conditional statement occurrence |
22 |
루프문 발생 |
33 | 리턴문 발생Return statement occurs |
44 | 브레이크(break) 또는 컨티뉴(continue)문 발생Break or continue statement occurs |
55 | 엑시트(exit) 또는 어서트(assert) 메소드 호출(method invocation) 발생Exit or assert method invocation |
66 | 널 표현(null expression) 발생Null expression occurs |
77 | 널 값과의 비교(comparisons with a null value) 발생Encounters with a null value |
88 | 널 할당(null assignments) 발생Null assignments occur |
99 | 널 값을 리턴하는 문(statements)의 발생The occurrence of a statement that returns a null value |
Claims (8)
- 정적분석기와 연동하는 경보 유형 분류 장치에서 실행되며, 정적분석기에서 발생한 오류 검출 경보를 유형별로 분류하기 위한 방법으로서, It is executed in the alarm type classification device linked with the static analyzer, and is a method for classifying error detection alarms generated by the static analyzer by type.1) 발생한 오류 검출 경보에 관한 경보 경로(alarm path) 정보 및 경보의 대상이 된 소스 코드 정보를 입력받는 단계- 상기 경보 경로 정보는 소스 코드의 실행 경로 중에서 상기 발생한 오류 검출 경보와 관련된 실행 경로에 관한 정보임-; 1) receiving alarm path information on an error detection alarm that has occurred and source code information that is an object of the alarm; the alarm path information is stored in an execution path related to the error detection alarm that has occurred in a source code execution path; Information about;2) 상기 소스 코드를 추상 구문 트리(abstract syntax tree, AST)로 변환하는 단계; 2) converting the source code into an abstract syntax tree (AST);3) 상기 추상 구문 트리에서 상기 오류 검출 경보와 관련되지 않은 불요 서브트리(unnecessary subtree)를 제거하는 단계; 3) removing an unnecessary subtree not associated with the error detection alert from the abstract syntax tree;4) 미리 설정된 피쳐 패턴 세트에 근거하여, 불요 서브트리(unnecessary subtree)가 제거된 상기 추상 구문 트리에 대한 피쳐 벡터를 수득하는 단계; 및 4) obtaining a feature vector for the abstract syntax tree from which unnecessary subtrees have been removed based on a set of preset feature patterns; And5) 수득된 상기 피쳐 벡터를 미리 설정된 방식으로 클러스터링하여 상기 피쳐 벡터에 대응하는 오류 검출 경보를 유형별로 분류하는 단계;를 포함하여 구성된 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법.5) clustering the obtained feature vectors in a predetermined manner to classify the error detection alerts corresponding to the feature vectors by type. 2.
- 제1항에 있어서, The method of claim 1,상기 1) 단계에서, In step 1) above,발생한 오류 검출 경보에 관한 경보 타입(alarm types) 정보를 더 입력받으며- 상기 경보 타입 정보는 발생한 오류 검출 경보가 미리 설정된 경보 타입 중에서 어느 타입에 해당하는지에 관한 정보임-, Further receiving alarm type information on an error detection alarm that has occurred, wherein the alarm type information is information on which type of alarm detection alarm corresponds to a preset alarm type;상기 4) 단계에서, In step 4),상기 피쳐 패턴 세트는 상기 오류 검출 경보의 경보 타입에 대하여 미리 설정된 것임을 특징으로 하는 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법.And the feature pattern set is preset for an alert type of the error detection alert.
- 제1항에 있어서, The method of claim 1,상기 3) 단계에서, 상기 불요 서브트리(unnecessary subtree)의 제거는, In the step 3), the removal of the unnecessary subtree (unnecessary subtree),오류 검출 경보와 관련된 실행 경로 상에서 실행된 구문을 제외한 다른 일반 구문을 제거하는 제1 정책과, A first policy for removing general syntax other than syntax executed on an execution path associated with an error detection alert;오류 검출 경보와 관련된 실행 경로 상에서 실행된 분기문이 아닌 다른 분기문을 제거하는 제2 정책과- 단, 오류 검출 경보와 관련된 실행 경로는 분기문의 조건 판별 결과를 포함함-, A second policy for removing a branch statement other than the branch statement executed on the execution path associated with the error detection alert, provided that the execution path related to the error detection alert includes the result of condition determination of the branch statement,오류 검출 경보와 관련된 실행 경로 상에서 실행된 반복문이 아닌 다른 반복문을 제거하는 제3 정책과, A third policy for removing loops other than loops executed on the execution path associated with the error detection alert;오류 검출 경보와 관련된 실행 경로 상에서 호출된 함수 및 상기 함수의 실행 경로를 상기 함수를 호출하는 노드의 서브트리로 포함하는 제4 정책과, A fourth policy comprising a function called on an execution path associated with an error detection alert and a execution path of the function as a subtree of a node invoking the function;오류 검출 경보와 관련된 실행 경로와 관계 없는 선언문을 제거하는 제5 정책 중의 적어도 어느 하나의 정책에 근거하여 이뤄지는 것을 특징으로 하는 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법.Method for classifying an alarm type in error detection of the source code, characterized in that based on at least one policy of the fifth policy for removing a statement irrelevant to the execution path associated with the error detection alert.
- 제1항에 있어서, The method of claim 1,상기 4) 단계에서, 상기 피쳐 패턴 세트는, In the step 4), the feature pattern set,미리 설정된 n 개의 피쳐 패턴의 세트 형태로 구성되며, It consists of a set of n preset feature patterns,상기 피쳐 패턴은, 조건문 발생, 루프문 발생, 리턴문 발생, 브레이크(break) 또는 컨티뉴(continue)문 발생, 엑시트(exit) 또는 어서트(assert) 메소드 호출(method invocation) 발생, 널 표현(null expression) 발생, 널 값과의 비교(comparisons with a null value) 발생, 널 할당(null assignments) 발생, 널 값을 리턴하는 문(statements)의 발생 중의 어느 하나인 것을 특징으로 하는 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법.The feature pattern may include a conditional statement occurrence, a loop statement occurrence, a return statement occurrence, a break or continue statement occurrence, an exit or assert method invocation, and a null expression. expression detection, occurrences of comparisons with a null value, occurrences of null assignments, or occurrences of statements that return null values. How to classify alarm types.
- 제1항에 있어서, The method of claim 1,상기 4) 단계에서, 상기 불요 서브트리(unnecessary subtree)가 제거된 상기 추상 구문 트리에 대한 피쳐 벡터(V(R))의 수득 과정은, In the step 4), the process of obtaining the feature vector V (R) for the abstract syntax tree from which the unnecessary subtree is removed is401) 하기 수학식1과 같이, n 개의 피쳐 패턴(p)의 세트 형태로 구성된 피쳐 패턴 세트(P)를 정의하는 단계; 401) defining a feature pattern set P composed of a set form of n feature patterns p as shown in Equation 1 below;[수학식1][Equation 1]P = {p1, p2, ..., pn}P = {p 1 , p 2 , ..., p n }402) 하기 수학식2와 같이, 추상 구문 트리 상의 임의의 노드 d에 대한 n 차원의 패턴 만족 벡터(v(P,d))를 정의하는 단계; 402) defining an n-dimensional pattern satisfaction vector v (P, d) for any node d on the abstract syntax tree as shown in Equation 2 below;[수학식2][Equation 2](단, S(d,pi)는 임의의 노드 d 또는 노드 d를 루트로 하는 서브트리가 i 번째 피쳐 패턴(pi)에 매칭되는지 여부를 나타내는 인자로서, 하기 수학식3과 같이 정의되며, i 번째 피쳐 패턴(pi)은 단일 노드 또는 서브트리일 수 있음(Where S (d, p i ) is a factor indicating whether an arbitrary node d or a subtree rooted at node d matches the i th feature pattern p i , and is defined as in Equation 3 below. , i th feature pattern (p i ) can be a single node or a subtree[수학식3][Equation 3]403) 하기 수학식4와 같이, 추상 구문 트리 상의 임의의 노드 D에 대한 피쳐 벡터(V(P,D))를 정의하는 단계; 및 403) defining a feature vector V (P, D) for any node D on the abstract syntax tree, as shown in Equation 4 below; And[수학식4][Equation 4](단, d1,...,dm은 임의의 노드 D의 자식 노드들이며, (Where d 1 , ..., d m are children of any node D,V(P,d1)...V(P,dm) 는 자식 노드 d1,...,dm에 대하여 상기 수학식4를 통해 구한 피쳐 벡터이며, V (P, d 1 ) ... V (P, d m ) is a feature vector obtained through Equation 4 for the child nodes d 1 , ..., d m ,v(P,D)는 임의의 노드 D에 대한 n 차원의 패턴 만족 벡터임)v (P, D) is an n-dimensional pattern satisfaction vector for any node D)404) 하기 수학식5를 이용하여, 상기 불요 서브트리(unnecessary subtree)가 제거된 상기 추상 구문 트리에 대한 피쳐 벡터(V(R))를 수득하는 단계;를 포함하여 구성된 것을 특징으로 하는 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법.404) using Equation 5 below, obtaining a feature vector V (R) for the abstract syntax tree from which the unnecessary subtree has been removed; Method of classifying alarm types in error detection.[수학식5] [Equation 5](단, R은 상기 불요 서브트리(unnecessary subtree)가 제거된 상기 추상 구문 트리의 루트 노드로서 상기 수학식4의 노드 D에 대응함)(Where R is the root node of the abstract syntax tree from which the unnecessary subtree is removed and corresponds to node D of Equation 4)
- 제1항에 있어서, The method of claim 1,상기 5) 단계에서, 상기 클러스터링은 K-means 알고리즘에 의해 실행되는 것을 특징으로 하는 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법.And in step 5), the clustering is performed by a K-means algorithm.
- 하드웨어와 결합되어 제1항 내지 제6항 중의 어느 한 항에 따른 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법을 실행시키기 위하여 매체에 저장된 컴퓨터 프로그램.A computer program, coupled with hardware, stored on a medium for executing an alarm type classification method in the error detection of source code according to any one of the preceding claims.
- 제1항 내지 제6항 중의 어느 한 항에 따른 소스 코드의 오류 검출에 있어서 경보 유형 분류 방법을 컴퓨터에서 실행하기 위한 컴퓨터 프로그램이 기록된, 컴퓨터로 판독 가능한 기록 매체.A computer-readable recording medium having recorded thereon a computer program for executing an alarm type classification method in a computer in detecting an error of a source code according to any one of claims 1 to 6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/528,792 US10394687B2 (en) | 2014-11-28 | 2015-11-26 | Method for classifying alarm types in detecting source code error and nontransitory computer readable recording medium therefor |
JP2017528221A JP6369736B2 (en) | 2014-11-28 | 2015-11-26 | Alarm type classification method in error detection of source code, computer program therefor, and recording medium therefor |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2014-0168971 | 2014-11-28 | ||
KR20140168971 | 2014-11-28 | ||
KR10-2015-0028436 | 2015-02-27 | ||
KR1020150028436A KR101694783B1 (en) | 2014-11-28 | 2015-02-27 | Alarm classification method in finding potential bug in a source code, computer program for the same, recording medium storing computer program for the same |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016085273A1 true WO2016085273A1 (en) | 2016-06-02 |
Family
ID=56074710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2015/012792 WO2016085273A1 (en) | 2014-11-28 | 2015-11-26 | Method for classifying alarm types in detecting source code error, computer program therefor, recording medium thereof |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2016085273A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110347428A (en) * | 2018-04-08 | 2019-10-18 | 北京京东尚科信息技术有限公司 | A kind of detection method and device of code similarity |
CN110413490A (en) * | 2019-08-01 | 2019-11-05 | 北京百度网讯科技有限公司 | Determine method, the error message code classification method and device of type of error message |
CN117453578A (en) * | 2023-12-25 | 2024-01-26 | 杭州云动智能汽车技术有限公司 | NMEA sentence detection method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100333069A1 (en) * | 2009-06-29 | 2010-12-30 | International Business Machines Corporation | Static code analysis |
US20110078651A1 (en) * | 2009-09-28 | 2011-03-31 | Cadence Design Systems, Inc. | Method and system for test reduction and analysis |
EP2369529A1 (en) * | 2010-03-24 | 2011-09-28 | Alcatel Lucent | A method of detecting anomalies in a message exchange, corresponding computer program product, and data storage device therefor |
US20120216280A1 (en) * | 2011-02-18 | 2012-08-23 | Microsoft Corporation | Detection of code-based malware |
US20130145215A1 (en) * | 2011-12-04 | 2013-06-06 | International Business Machines Corporation | Eliminating false-positive reports resulting from static analysis of computer software |
-
2015
- 2015-11-26 WO PCT/KR2015/012792 patent/WO2016085273A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100333069A1 (en) * | 2009-06-29 | 2010-12-30 | International Business Machines Corporation | Static code analysis |
US20110078651A1 (en) * | 2009-09-28 | 2011-03-31 | Cadence Design Systems, Inc. | Method and system for test reduction and analysis |
EP2369529A1 (en) * | 2010-03-24 | 2011-09-28 | Alcatel Lucent | A method of detecting anomalies in a message exchange, corresponding computer program product, and data storage device therefor |
US20120216280A1 (en) * | 2011-02-18 | 2012-08-23 | Microsoft Corporation | Detection of code-based malware |
US20130145215A1 (en) * | 2011-12-04 | 2013-06-06 | International Business Machines Corporation | Eliminating false-positive reports resulting from static analysis of computer software |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110347428A (en) * | 2018-04-08 | 2019-10-18 | 北京京东尚科信息技术有限公司 | A kind of detection method and device of code similarity |
CN110413490A (en) * | 2019-08-01 | 2019-11-05 | 北京百度网讯科技有限公司 | Determine method, the error message code classification method and device of type of error message |
CN110413490B (en) * | 2019-08-01 | 2023-07-14 | 阿波罗智能技术(北京)有限公司 | Method for determining error information type, error information code classification method and device |
CN117453578A (en) * | 2023-12-25 | 2024-01-26 | 杭州云动智能汽车技术有限公司 | NMEA sentence detection method and device, electronic equipment and storage medium |
CN117453578B (en) * | 2023-12-25 | 2024-04-19 | 杭州云动智能汽车技术有限公司 | NMEA sentence detection method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6369736B2 (en) | Alarm type classification method in error detection of source code, computer program therefor, and recording medium therefor | |
WO2016085272A1 (en) | Method for reducing false alarms in detecting source code error, computer program therefor, recording medium thereof | |
Han et al. | MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics | |
US7809670B2 (en) | Classification of malware using clustering that orders events in accordance with the time of occurance | |
WO2017213400A1 (en) | Malware detection by exploiting malware re-composition variations | |
WO2017131263A1 (en) | Hybrid instance selection method using nearest neighboring point for cross project defect prediction | |
US9697058B2 (en) | Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor | |
WO2016085273A1 (en) | Method for classifying alarm types in detecting source code error, computer program therefor, recording medium thereof | |
WO2018016671A2 (en) | Dangerous code detection system for checking security vulnerability and method thereof | |
CN108491228A (en) | A kind of binary vulnerability Code Clones detection method and system | |
Aafer et al. | Android {SmartTVs} vulnerability discovery via {log-guided} fuzzing | |
US20080127043A1 (en) | Automatic Extraction of Programming Rules | |
Bian et al. | Detecting bugs by discovering expectations and their violations | |
Habib et al. | Neural bug finding: A study of opportunities and challenges | |
CN109657461B (en) | RTL hardware Trojan horse detection method based on gradient lifting algorithm | |
KR102318991B1 (en) | Method and device for detecting malware based on similarity | |
Kim et al. | Malicious behavior detection method using api sequence in binary execution path | |
Zhang et al. | Slowing down the aging of learning-based malware detectors with api knowledge | |
CN115883218B (en) | Multi-mode data model-based composite attack chain completion method, system and medium | |
Jang et al. | An intelligent trend prediction and reversal recognition system using dual-module neural networks | |
CN109002716A (en) | A kind of malicious code intrusion detection of mobile application and prevention method | |
US11270000B1 (en) | Generation of file digests for detecting malicious executable files | |
Cheng et al. | Multi-IF: An approach to anomaly detection in self-driving systems | |
Yokomori et al. | Use-Relationship Based Classification for Software Components. | |
KR101694778B1 (en) | False alarm reducing method in finding potential bug in a source code, computer program for the same, recording medium storing computer program for the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15863447 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15528792 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2017528221 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15863447 Country of ref document: EP Kind code of ref document: A1 |