Inaccessible function call path detection method in complex system

A function call path and complex system technology, applied in the computer field, can solve problems such as the lack of detection methods for unreachable function call paths, and achieve effective analysis and accurate detection effects

Inactive Publication Date: 2016-10-12
BEIJING INFORMATION SCI & TECH UNIV +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a lack of accurate and efficient detection methods for unreachable function call paths in complex systems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inaccessible function call path detection method in complex system
  • Inaccessible function call path detection method in complex system
  • Inaccessible function call path detection method in complex system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0032] First, the concepts used in the embodiments of the present invention are described for easy understanding.

[0033] 1. Control flow graph:

[0034] The control flow graph consists of nodes (N) and edges (E), where each node represents a basic code block, and each edge has a start node (B) and a termination node (D), representing the basic code block a control flow. So the control flow graph can be represented by a quadruple (E∈N×N, B∈N, D∈N).

[0035] 2. Function call path set: for the program source code, the set of function name sequences from the program entry point to the exit point obtained from the function call relationship, expressed as G={P 0 ,P 1 ,...,P n}, P i ={F 0 , F 1 ,...,F n} represents one of the function call paths, F ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an inaccessible function call path detection method in a complex system. The method comprises the steps that 1, function pointer processing is carried out for a source code to distinguish declaration, evaluation and use of a function pointer; 2, the source code processed through the function pointer generates an intermediate code of the source code, wherein the intermediate code comprises multiple function units, each function unit uses a function as a basic processing unit, each function unit comprises at least one basic code block, and data flow information in each basic code block and control flow information among the basic code blocks are extracted and stored in a json file; 3, whether a branch node in the control flow information has the certain direction or not is judged so as to carry out inaccessible control flow detection.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for detecting an unreachable function call path in a complex system. Background technique [0002] With the continuous progress of society and the rapid development of computer technology, software, as the soul of computer, is widely used in national economy and social life. At the same time, with the continuous improvement of user needs, the scale of the software is also expanding while the functions of the software are continuously enhanced, which leads to the complexity of the entire software system. Since software complexity is the main source of software defects, the continuous improvement of complexity is also a new challenge to software testing and maintenance. [0003] As a basic test method, the path test method lies in how to accurately obtain the set of test paths. Among them, base path testing is a path testing technique first proposed by Tom McCabe. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3668
Inventor 牟永敏
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products