Extending static code analysis with application-specific rules by analyzing runtime execution traces | Kütüphane.osmanlica.com

Extending static code analysis with application-specific rules by analyzing runtime execution traces

İsim Extending static code analysis with application-specific rules by analyzing runtime execution traces
Yazar Ersoy, E., Sözer, Hasan
Basım Tarihi: 2016
Basım Yeri - Springer International Publishing
Tür Süreli Yayın
Dil İngilizce
Dijital Evet
Yazma Hayır
Kütüphane: Özyeğin Üniversitesi
Demirbaş Numarası 1865-0929
Kayıt Numarası 3e09db48-6724-4a8e-a1c0-51a0848bfb63
Lokasyon Computer Science
Tarih 2016
Notlar TÜBİTAK
Örnek Metin Static analysis tools cannot detect violations of application-specific rules. They can be extended with specialized checkers that implement the verification of these rules. However, such rules are usually not documented explicitly. Moreover, the implementation of specialized checkers is a manual process that requires expertise. In this work, application-specific programming rules are automatically extracted from execution traces collected at runtime. These traces are analyzed offline to identify programming rules. Then, specialized checkers for these rules are introduced as extensions to a static analysis tool so that their violations can be checked throughout the source code. We implemented our approach for Java programs, considering 3 types of faults. We performed an evaluation with an industrial case study from the telecommunications domain. We were able to detect real faults with checkers that were generated based on the analysis of execution logs.
DOI 10.1007/978-3-319-47217-1_4
Cilt 659
Kaynağa git Özyeğin Üniversitesi Özyeğin Üniversitesi
Özyeğin Üniversitesi Özyeğin Üniversitesi
Kaynağa git

Extending static code analysis with application-specific rules by analyzing runtime execution traces

Yazar Ersoy, E., Sözer, Hasan
Basım Tarihi 2016
Basım Yeri - Springer International Publishing
Tür Süreli Yayın
Dil İngilizce
Dijital Evet
Yazma Hayır
Kütüphane Özyeğin Üniversitesi
Demirbaş Numarası 1865-0929
Kayıt Numarası 3e09db48-6724-4a8e-a1c0-51a0848bfb63
Lokasyon Computer Science
Tarih 2016
Notlar TÜBİTAK
Örnek Metin Static analysis tools cannot detect violations of application-specific rules. They can be extended with specialized checkers that implement the verification of these rules. However, such rules are usually not documented explicitly. Moreover, the implementation of specialized checkers is a manual process that requires expertise. In this work, application-specific programming rules are automatically extracted from execution traces collected at runtime. These traces are analyzed offline to identify programming rules. Then, specialized checkers for these rules are introduced as extensions to a static analysis tool so that their violations can be checked throughout the source code. We implemented our approach for Java programs, considering 3 types of faults. We performed an evaluation with an industrial case study from the telecommunications domain. We were able to detect real faults with checkers that were generated based on the analysis of execution logs.
DOI 10.1007/978-3-319-47217-1_4
Cilt 659
Özyeğin Üniversitesi
Özyeğin Üniversitesi yönlendiriliyorsunuz...

Lütfen bekleyiniz.