Keywords:-

Keywords: software engineering, component testing, regression testing, code coverage

Article Content:-

Abstract

Dynamic loading is an essential mechanism for computer software development. It enables an program, the versatility to use its exported functionalities and energetically link a part. Dynamic loading is really a system by which a pc program are able to at run-time, fill a collection into memory, recall the handles of parameters and functions included in the library, run those functions or get those variables, and sell the library from recollection. This function presents a signal
coverage approach called motionless binary analysis to assess and discover mistakes and weaknesses about the element. Thus the dangerous and exposed parts may be recognized previous to loading energetically into applications.

References:-

References

Akos Kiss, J. Jasz, G. Lehotai, andT. Gyimothy. Interprocedural static

segmenting of binary executables. In Proc. SCAM, 2003.

G. Balakrishnan and T. Reps. Analyzing memory accesses in x86

executables. In Proc. CC, 2004.

G. Balakrishnan and T. Reps. Divine: discovering variables in executables.

In Proc. VMCAI, 2007.

G. Balakrishnan and T. Reps. Analyzing stripped device-driver executables.

In Proc. TACAS, 2008.

D. Binkley. Precise executable interprocedural blocks. ACM Lett.

Program. Lang. Syst., 2(1-4):31-45, 1993.

dlopen man page. http://linux.die.net/man/3/dlopen.

Dynamic-Link Library Search Order. http://msdn.microsoft. com/enus/

library/ms682586(VS.85).aspx.

J. Ferrante, K. J. Ottenstein, and J. D. Warren. The program dependence

graph and its use in optimization. ACM Trans. Program. Lang. Syst.,

(3):319-349, 1987.

S. Horwitz, T. Reps, and D. Binkley. Interprocedural segmenting using

dependence graphs. ACM Trans. Program. Lang. Syst., 12(1):26-60,

S. Horwitz, T. Reps, and M. Sagiv. Demand interprocedural dataflow

analysis. In Proc. FSE, 1995.

J. C. King. Symbolic execution and program testing. Commun. ACM,

(7):385-394, 1976.

T. Kwon and Z. Su. Automatic detection of unsafe component loadings.

In Proc. ISSTA, 2010.

J. Lim, A. Lal, and T. Reps. Symbolic analysis via semantic reinterpretation.

In Proc. SPIN, 2009.

J. Lim and T. Reps. A system for generating static analyzers for machine

instructions. In Proc. CC, 2008.

Microsoft Portable Executable and Common Object File Format Specification.

http://www.microsoft.com/whdc/system/platform/

firmware/PECOFF.mspx.

A. Orso, S. Sinha, and M. J. Harrold. Incremental segmenting based on

data-dependence types. In Proc. ICSM, 2001.

T. Reps. Solving demand versions of interprocedural analysis problems.

In Proc. CC, 1994.

T. Reps and G. Balakrishnan. Improved memory-access analysis for x86

executables. In Proc. CC, 2008.

T. Reps, G. Balakrishnan, J. Lim, and T. Teitelbaum. A next-generation

platform for analyzing executables. In Proc. APLAS, 2005.

T. Reps, S. Horwitz, M. Sagiv, and G. Rosay. Speeding up segmenting.

In Proc. FSE, 1994.

S. Sinha, M. J. Harrold, and G. Rothermel. System-dependence-graphbased

segmenting of programs with arbitrary interprocedural control

flow. In Proc. ICSE, 1999.

A. V. Thakur, J. Lim, A. Lal, A. Burton, E. Driscoll, M. Elder, T. Andersen,

and T. W. Reps. Directed proof generation for machine code. In

Proc. CAV, 2010.

F. Tip. A survey of program segmenting techniques. Technical report,

CWI (Centre for Mathematics and Computer Science), Amsterdam, The

Netherlands, 1994.

Types of Dependencies. http://dependencywalker.com/help/

html/dependency_types.htm.

M. Weiser. Program segmenting. In Proc. ICSE, 1981.

B. Xu, J. Qian, X. Zhang, Z. Wu, and L. Chen. A brief survey of

program segmenting. SIGSOFT Softw. Eng. Notes, 30(2):1-36, 2005.

Downloads

Citation Tools

How to Cite
reddy, M., & Kuppa, M. S. S. (2013). A Static Code Coverage Analysis for Unsafe and Vulnerable Component Detection. International Journal Of Mathematics And Computer Research, 1(09), 233-237. Retrieved from https://ijmcr.in/index.php/ijmcr/article/view/224