Mining patterns of unsatisfiable constraints to detect infeasible paths
Detection of infeasible paths is required in many areas including test coverage analysis, test case generation, security vulnerability analysis, etc. Existing approaches typically use static analysis coupled with symbolic evaluation, heuristics, or path-pattern analysis. This paper is related to the...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4779 https://ink.library.smu.edu.sg/context/sis_research/article/5782/viewcontent/Mining_Patterns_of_Unsatisfiable_Constraints_to_Detect_Infeasible_Paths_AST15.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5782 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-57822020-01-16T10:19:26Z Mining patterns of unsatisfiable constraints to detect infeasible paths DING, Sun TAN, Hee Beng Kuan SHAR, Lwin Khin Detection of infeasible paths is required in many areas including test coverage analysis, test case generation, security vulnerability analysis, etc. Existing approaches typically use static analysis coupled with symbolic evaluation, heuristics, or path-pattern analysis. This paper is related to these approaches but with a different objective. It is to analyze code of real systems to build patterns of unsatisfiable constraints in infeasible paths. The resulting patterns can be used to detect infeasible paths without the use of constraint solver and evaluation of function calls involved, thus improving scalability. The patterns can be built gradually. Evaluation of the proposed approach shows promising results. 2015-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4779 info:doi/10.1109/AST.2015.21 https://ink.library.smu.edu.sg/context/sis_research/article/5782/viewcontent/Mining_Patterns_of_Unsatisfiable_Constraints_to_Detect_Infeasible_Paths_AST15.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Infeasible paths pattern mining symbolic evaluation static analysis structural testing Databases and Information Systems Data Storage Systems |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Infeasible paths pattern mining symbolic evaluation static analysis structural testing Databases and Information Systems Data Storage Systems |
spellingShingle |
Infeasible paths pattern mining symbolic evaluation static analysis structural testing Databases and Information Systems Data Storage Systems DING, Sun TAN, Hee Beng Kuan SHAR, Lwin Khin Mining patterns of unsatisfiable constraints to detect infeasible paths |
description |
Detection of infeasible paths is required in many areas including test coverage analysis, test case generation, security vulnerability analysis, etc. Existing approaches typically use static analysis coupled with symbolic evaluation, heuristics, or path-pattern analysis. This paper is related to these approaches but with a different objective. It is to analyze code of real systems to build patterns of unsatisfiable constraints in infeasible paths. The resulting patterns can be used to detect infeasible paths without the use of constraint solver and evaluation of function calls involved, thus improving scalability. The patterns can be built gradually. Evaluation of the proposed approach shows promising results. |
format |
text |
author |
DING, Sun TAN, Hee Beng Kuan SHAR, Lwin Khin |
author_facet |
DING, Sun TAN, Hee Beng Kuan SHAR, Lwin Khin |
author_sort |
DING, Sun |
title |
Mining patterns of unsatisfiable constraints to detect infeasible paths |
title_short |
Mining patterns of unsatisfiable constraints to detect infeasible paths |
title_full |
Mining patterns of unsatisfiable constraints to detect infeasible paths |
title_fullStr |
Mining patterns of unsatisfiable constraints to detect infeasible paths |
title_full_unstemmed |
Mining patterns of unsatisfiable constraints to detect infeasible paths |
title_sort |
mining patterns of unsatisfiable constraints to detect infeasible paths |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2015 |
url |
https://ink.library.smu.edu.sg/sis_research/4779 https://ink.library.smu.edu.sg/context/sis_research/article/5782/viewcontent/Mining_Patterns_of_Unsatisfiable_Constraints_to_Detect_Infeasible_Paths_AST15.pdf |
_version_ |
1770575028663877632 |