2011 18th Asia-Pacific Software Engineering Conference 2011
DOI: 10.1109/apsec.2011.23
|View full text |Cite
|
Sign up to set email alerts
|

STVL: Improve the Precision of Static Defect Detection with Symbolic Three-Valued Logic

Abstract: Among various abstract domains, the interval domain is simple but also less precise. To improve the precision of static defect detection based on the interval domain, we propose a symbolic three-valued logic (STVL) based interval analysis. Our STVL differs from other symbolic techniques in that it is capable of handling the logical relationship between variables, which could help eliminating false positives. In addition, for the pointer related defect detection, we introduce a STVL-based pointer model, which n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…The value of data.d will also be 3. But after L8, L9 branch sentences, the value of i on L10 will be 1 or 2, if we do not use sensitive path analysis, the one that a[i] is assigned may be a [1] or a [2]. In this way, we can only process weak update operation.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…The value of data.d will also be 3. But after L8, L9 branch sentences, the value of i on L10 will be 1 or 2, if we do not use sensitive path analysis, the one that a[i] is assigned may be a [1] or a [2]. In this way, we can only process weak update operation.…”
Section: Motivationmentioning
confidence: 99%
“…And models based on region use a region which is represented by a continuous memory block of a memory object. STVL [2] considers the logic relations of value of variables, but it cannot describe the hierarchical relations of compound type data structure. Another way is to limit the testing program requirements, such as no memory allocated for the analyzed program, and assumes all types are completely safe.…”
Section: Introductionmentioning
confidence: 99%
“…What information to capture in each procedure summary has been carefully tuned so that the summary should not lose any common defect-related behaviour? Because of limited space, we do not explain our inter-procedural analysis, see [8,10] for details.…”
Section: B Correlation Definitionmentioning
confidence: 99%
“…While encountering at call site , the precise summary is extracted by comparing and the conditional constraints binding with the summary. Then we leverage the refined correlation summary in two different manners: (1) if the summary information is concrete deterministic abstract domains, we will update the call site context using these fresh dataflows for subsequent detection and (2) if the summary is represented by some symbolic expressions, we employ the reversed mapping function to decide which symbol should be substituted by the actual parameter, and the dataflow iterates continually in this manner [8].…”
Section: (2) Correlation Summary Instantiationmentioning
confidence: 99%
“…Zhao YS et al [3] introduces symbolized three-valued logical abstraction domains on the basis of interval abstract domain to support the logical association between the expression variables. Jung et al [4] use the Bayesian network to calculate the possibility of an alarm as a real defect.…”
Section: Introductionmentioning
confidence: 99%