Complete program execution state modeling method used in defect analysis of source code
A defect analysis and program execution technology, applied in the field of computer information security, can solve problems such as detecting code defects, tool false positives, failure to provide, etc., to achieve the effect of enhancing analysis ability and accurate inspection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0026] The present invention provides a complete program execution state modeling method, including the following steps:
[0027] (1) Set the initial state of the program; the initial state is as follows: for all global variables and function parameters, initialize their values to symbolic values; for all local variables, initialize their values to undefined values; all expressions are Empty; all symbolic constraints are empty; all detector-related information is empty.
[0028] (2) The program is executed along the path;
[0029] (3) A simulation state is associated with each point of the path, and the simulation state is stored in a state manager; the simulation state includes five sub-parts. Each point refers to a location on the program path, such as the entry and exit of a statement. The association is that each statement for the program corresponds to a simulated execution state.
[0030] The simulation state consists of the following five subsections:
[0031] a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More