A Method of Coverage Analysis Method for Safety-Critical Embedded Software Object Code

A technology of embedded software and object code, used in software testing/debugging, instrumentation, error detection/correction, etc.

Active Publication Date: 2019-03-01
XIAN FLIGHT SELF CONTROL INST OF AVIC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Patent "Using JTAG debugging method to realize universal target code coverage test system and test method" Patent No. CN104657263A uses JTAG emulator to test target code coverage, but this method needs to rely on the target environment and simulation equipment with JTAG port

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Coverage Analysis Method for Safety-Critical Embedded Software Object Code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. For the overall flow chart, see figure 1 ,Specific steps are as follows:

[0013] 步骤一在测试前,对某源码进行编译,获取到二进制码9421FFE8(地址0x04001c50)、93E10014、7C3F0B78、7C601B78、7C892378、B01F0008、7D204B78、B01F000A、A13F0008、A01F000A、7C090214、B01F000C、A01F000C、7C000734、7C030378、 81610000, 83EBFFFC, D615B78, 4E800020 (address 0x04001c98), and insert a breakpoint before the function entry 9421FFE8 instruction and after the function exit 4E800020

[0014] Step 2 When the target code executes to the address 0x04001c50 to generate an interrupt, the monitoring module controls the target machine to perform a single step. When the target machine enters a single step exception, the exception handling module records the target code 9421FFE8, 93E10014, 7C3F0B78, 7C601B78, 7C892378, B01F0008, 7D204B78, B01F000A, A13F0008, A01F000A, 7C090214, B01F000C, A01F000C, 7C000734, 7C030...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention belongs to target code statement coverage analysis technologies, and specifically, to a security-critical embedded software target code statement coverage analysis method. According to the security-critical embedded software target code coverage analysis method provided by the present invention, a program is compiled into a target code with debugging information, and before a test for the target code, by selecting a function that needs to be tested, a monitoring module inserts a break point at an entry / exit of the function automatically. During the test for the target code, when running to a first break point, a target machine records each executed target code, and when a break point is triggered next time, the monitoring module controls the target machine to send the executed target codes back to a host through a communication link, and when the host receives a feedback, the executed target codes are compared with compiled binary target codes and executed binary target codes are identified. When the test ends, a statement coverage of the target code is obtained by calculating an execution rate of the target code.

Description

technical field [0001] The invention belongs to the target code statement coverage analysis technology, in particular to a safety-critical embedded software target code statement coverage analysis method. Background technique [0002] For safety-critical embedded software, object code coverage is one of the important indicators to consider its security. In the field of high security, it is considered that there must be a one-to-one correspondence between the design and implementation of the system and the object code running in the target environment. However, at present, the industry lacks an effective means of object code analysis, and it is often necessary to manually analyze the object code to ensure the security of the object code. Therefore, how to complete the coverage analysis of the target code in an automated way can not only ensure the quality of the product, but also improve the efficiency of test verification. [0003] The patent "A Method for Embedded C Langua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3676
Inventor 杜林武方方徐建军赵亮颜纪迅张丹涛
Owner XIAN FLIGHT SELF CONTROL INST OF AVIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products