全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

路径敏感的源码关联变量模式挖掘及缺陷检测

, PP. 691-698

Keywords: 数据挖掘,路径敏感分析,关联变量模式,源码缺陷检测

Full-Text   Cite this paper   Add to My Lib

Abstract:

大量而广泛存在的源码系统使得软件源码的安全问题日益重要。文中在大型源码系统中采取路径敏感的方式挖掘关联变量访问规则,并自动检测系统中因不一致访问关联变量引发的源码缺陷。通过结合程序源码的逻辑信息及路径敏感信息,挖掘出其中的源码关联变量,避免路径非敏感方法带来的错误。对路径敏感方法挖掘源码关联变量中面临的主要挑战:路径权重不均、路径爆炸问题,提出较高效的解决办法。在Linux源码系统中验证方法的正确性和高效性,实验结果表明该方法可高效、准确提取模式。

References

[1]  Lu Shan,Park S,Hu Chongfeng,et al.MUVI: Automatically Inferring Multi-Variable Access Correlations and Detecting Related Semantic and Concurrency Bugs // Proc of the 21st ACM SIGOPS Symposium on Operating Systems Principles.Skamania Lodge,USA,2007: 103-116
[2]  Li Zhenmin,Zhou Yuanyuan.PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code // Proc of the 10th European Software Engineering Conference Held Jointly with 13th ACM SGSOFT International Symposium on Foundations of Software Engineering.Lisbon,Portugal,2005: 306-315
[3]  Li Zhenmin,Lu Shan,Myagmar S,et al.CP-Miner: A Tool for Finding Copy Paste and Related Bugs in Operating System Code // Proc of the 6th Conference on Operating Systems Design and Implementation.San Francisco,USA,2004,VI: 289-302
[4]  Wasylkowski A,Zeller A,Lindig C.Detecting Object Usage Anomalies // Proc of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.Dubrovnik,Croatia,2007: 35-44
[5]  Xie Tao,Pei Jian.MAPO: Mining API Usages from Open Source Repositories // Proc of the 3rd International Workshop on Mining Software Repositories.Shanghai,China,2006: 54-57
[6]  Chang R Y,Podgurski A,Yang Jiong.Finding Whats Not There: A New Approach to Revealing Neglected Conditions in Software // Proc of the International Symposium on Software Testing and Analysis. London,UK,2007: 163-170
[7]  Novillo D.Tree SSA-A New High-Level Optimization Framework for GCC [EB/OL].[2003-05-21].http://www.airs.com/dnovillo/Papers/tree-ssa-gccs03-slides.pdf
[8]  Wang Jianyong,Han Jiawei,Pei Jian.CLOSET+:Searching for the Best Strategies for Mining Frequent Closed Itemsets // Proc of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Washington,USA,2003: 236-245
[9]  Han Jiawei,Kamber M.Data Mining: Concepts and Techniques.New York,USA: Morgan-Kaufman,2007
[10]  Livshits V B,Zimmermann T.DynaMine: Finding Common Error Patterns by Mining Software Revision Histories // Proc of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering.Lisbon,Portugal,2005: 296-305
[11]  Liu Chao,Chen Chen,Han Jiawei,et al.GPLAG: Detection of Software Plagiarism by Procedure Dependency Graph Analysis // Proc of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,Philadelphia,USA,2006: 872-881
[12]  Engler D,Chen D Y,Hallem S,et al.Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code // Proc of the 18th ACM Symposium on Operating Systems Principles.Banff,Canada,2001: 57-72
[13]  Shepherd D,Palm J,Pollock L,et al.Timna: A Framework for Automatically Combining Aspect Mining Analyses // Proc of the 20th IEEE/ACM International Conference on Automated Software Engineering.Long Beach,USA,2005: 184-193
[14]  Tan Lin,Zhang Xiaolan,Ma Xiao,et al.AutoISES: Automatically Inferring Security Specifications and Detecting Violations // Proc of the 17th Conference on Security Symposium.San Jose,USA,2008: 379-394
[15]  Tan Lin,Yuan Ding,Krishna G,et al.iComment: Bugs or Bad Comments? // Proc of the 21st ACM SIGOPS Symposium on Operating Systems Principles.Stevenson,USA,2007: 145-158
[16]  Ganapathy V,King D,Jaeger T,et al.Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis // Proc of the 29th International Conference on Software Engineering.Minneapolis,USA,2007: 458-467
[17]  Suresh T,Xie Tao.PARSEWeb: A Programmer Assistant for Reusing Open Source Code on the Web // Proc of the 22nd IEEE/ACM International Conference on Automated Software Engineering.Atlanta,USA,2007: 204-213
[18]  Soyeon P,Lu Shan,Zhou Yuanyuan.CTrigger: Exposing Atomicity Violation Bugs from Their Hiding Places // Proc of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems.Washington,USA,2009: 25-36
[19]  Shi Yao,Soyeon P,Yin Zuoning,et al.Do I Use the Wrong Definition? DefUse: Definition Use Invariants for Detecting Concurrency and Sequential Bugs // Proc of the Conference on Object-Oriented Programming: Systems,Languages,and Applications.Nevada,USA,2010: 160-174
[20]  Tan Lin,Zhou Yuanyuan,Yoann P.aComment: Mining Annotations from Comments and Code to Detect Interrupt-Related Concurrency Bugs // Proc of the 33rd International Conference on Software Engineering.Honolulu,USA,2011: 11-20

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133