4.
Cha Sang Kil
,
Avgerinos Th.
,
Rebert A.
,
Brumley D
. Unleashing Mayhem on Binary
Code // In Proceedings of the 33rd IEEE Symposium on Security and Privacy. 2012.
5.
Using
Symbolic Evaluation to Understand Behavior in Configurable Software
Systems / E. Reisner, Ch. Song, Kin-Keung Ma, Jeffrey S. Foster, A. Porter // In
Proceedings of the 32nd International Conference on Software Engineering (ICSE).
Cape Town, South Africa. 2010. P. 445–454.
6.
Xu Zh.
,
Zhang J.
,
Xu Zh.
Melton: a practical and precise memory leak detection
tool for C programs // Frontiers of Computer Science in China. 2015. Vol. 9. No. 1.
P. 34–54.
7.
Qadeer S.
,
Rajamani S.
,
Rehof J
. Summarizing procedures in concurrent programs //
31st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming
Languages. 2004. Vol. 39. P. 245–255.
8.
Braberman V.
,
Garbervetsky D.
,
Hym S.
,
Yovine S.
Summary-based inference of
quantitative bounds of live heap objects // Science of Computer Programming. 2013.
Vol. 92. P. 56–84.
9.
Clang
Static Analyzer. URL:
http://clang-analyzer.llvm.org(дата обращения:
15.04.2015).
10.
Clang
: a C language family frontend for LLVM. URL:
http://clang.llvm.org(дата
обращения: 15.04.2015).
11.
The LLVM
compiler infrastructure. URL:
http://llvm.org(дата обращения:
14.04.2015).
12.
Игнатьев В.Н.
Использование легковесного статического анализа для проверки
настраиваемых семантических ограничений языка программирования // Труды
Института системного программирования РАН. 2012. Т. 22. С. 169–188.
13.
Масштабируемый
инструмент поиска клонов кода на основе семантического
анализа программ / С. Саргсян, Ш. Курмангалеев, А. Белеванцев, А. Асланян,
А. Балоян // Труды Института системного программирования РАН. 2015. Т. 27.
С. 39–50.
14.
Reps T.
,
Horwitz S.
,
Sagiv M
. Precise interprocedural dataflow analysis via graph
reachability // In POPL ’95 Proceedings of the 22nd ACM SIGPLAN-SIGACT
symposium on Principles of programming languages. 1995. Р. 49–61.
15.
Xu Z.
,
Kremenek T.
,
Zhang J
. A memory model for static analysis of C programs // In
ISoLA’10 Proceedings of the 4th international conference on Leveraging applications
of formal methods, verification, and validation. 2010. Р. 535–548.
REFERENCES
[1] James C. King. Symbolic execution and program testing.
Communications of the
ACM
, 1976, vol. 19, no. 7, pp. 385–394.
[2] Aho A., Lam M., Sethi R., Ullman D. Compilers: Principles, Techniques, and Tools.
Addison-Wesley, 1986.
[3] Cadar C., Dunbar D., Engler D. KLEE: Unassisted and automatic generation of high-
coverage tests for complex systems programs.
In Proc. of the USENIX Symposium
on Operating System Design and Implementation
, 2008.
[4] Cha Sang Kil, Avgerinos Th., Rebert A., Brumley D. Unleashing Mayhem on Binary
Code.
In Proc. of the 33rd IEEE Symposium on Security and Privacy
, 2012.
[5] Reisner E., Song Ch., Ma Kin-Keung, Foster Jeffrey S., Porter A. Using Symbolic
Evaluation to Understand Behavior in Configurable Software Systems.
In Proc. of the
32nd International Conference on Software Engineering (ICSE)
, Cape Town, South
Africa, 2010, pp. 445–454.
[6] Xu Zh., Zhang J., Xu Zh. Melton: a practical and precise memory leak detection
tool for C programs.
Frontiers of Computer Science in China
, 2015, vol. 9, no. 1,
pp. 34–54.
94 ISSN 0236-3933. Вестник МГТУ им. Н.Э. Баумана. Сер. “Приборостроение”. 2015. № 5