Directed Dynamic Symbolic Execution for Static Analysis Warnings Confirmation
- 作者: Gerasimov A.Y.1
-
隶属关系:
- V.P. Ivannikov Institute for System Programming, Russian Academy of Sciences
- 期: 卷 44, 编号 5 (2018)
- 页面: 316-323
- 栏目: Article
- URL: https://journals.rcsi.science/0361-7688/article/view/176654
- DOI: https://doi.org/10.1134/S036176881805002X
- ID: 176654
如何引用文章
详细
Currently, there is no doubt among experts in the field of program certification and quality assurance that automated program analysis methods should be used to find bugs that lead to program security vulnerabilities. The national standard for the secure software development requires the use of source code static analysis tools as one of the measures of software quality assurance at the development stage and the application of dynamic analysis and fuzz-testing of the source code at the qualification testing stage. Fundamental limitations of automated program analysis and testing methods make it impossible to carry out simultaneously exhaustive and precise analysis of programs for errors. Thereof, researches are nowadays carried out aimed at reducing the effect of fundamental limitations on the quality and productivity of automated software error detection methods. This paper discusses an approach that combines methods of source code static analysis and dynamic symbolic execution in order to increase the program error detection efficiency.
作者简介
A. Gerasimov
V.P. Ivannikov Institute for System Programming, Russian Academy of Sciences
编辑信件的主要联系方式.
Email: agerasimov@ispras.ru
俄罗斯联邦, ul. Solzhenitsyna 25, Moscow, 109004
补充文件
