iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-319-64701-2_27
A Detecting Method of Array Bounds Defects Based on Symbolic Execution | SpringerLink
Skip to main content

A Detecting Method of Array Bounds Defects Based on Symbolic Execution

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

Array bounds is the most commonly fault in java programs design, it often leads to wrong results even system crash. To solve these problems, this paper proposed a detecting array bounds method based on symbolic execution. The method generated the abstract syntax tree from the source code, and then created a control flow graph according to the abstract syntax tree. It adopted flaw detectors to detect defects of array bound. Finally, using the standard function to test the ability of this method in detecting array bounds. The results indicated that this method can detect array bounds defects of crossing process indirectly, array bounds defects within process and array bounds defects of crossing process directly very well and it is better than some existing Java methods of detecting array bounds defects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hui, X.X., Zhang, Y.: Static analysis of array bound. Comput. Program. Skills Maintenance 4, 2 (2012). doi:10.16184/j.cnki.comprg.2012.04.019

    Google Scholar 

  2. Zhao, P., Li, J., Gong, Y.: Research on static test about array index out of range in java language. Comput. Eng. Appl. 44, 27 (2008). doi:10.3778/j.issn.1002-8331.2008.27.028

    Google Scholar 

  3. Xu, M.C., Liu, J.: A static checking method of array access violation based on abstract syntax tree. Comput. Eng. 32, 108–109 (2006). doi:10.3969/j.issn.1000-3428.2006.01.038

    Google Scholar 

  4. Gao, C.P., Tang, L.Q., Gong, Y.Z., Zhang, W.: Research on static and auto-testing method for array bounds based on integer range aggregation. Mini-Micro Syst. 27, 2222–2227 (2007). doi:10.3969/j.issn.1000-1220.2006.12.009

    Google Scholar 

  5. Ye, Y.F., Ye, J.M., Zhan, Z.M., Lei, Z.X.: Research on fault model of array bound and its detecting method. Microcomput. Inf. 31, 145–147 (2007). doi:10.3969/j.issn.1008-0570.2007.31.062

    Google Scholar 

  6. Zhang, S.J., Shang, Z.W.: Detection of array bound overflow by interval set based on Cppcheck. J. Comput. Appl. 33, 3257–3261 (2013). doi:10.11772/j.issn.1001-9081.2013.11.3257

    Google Scholar 

  7. Delzanno, B.G., Jung, G., Podelski, A.: Static analysis of array bounds as in model checking. Ext. Abstr. BMC Pediatr. 11, 1–8 (2010)

    Google Scholar 

  8. Chen, H.H., Jin, D.H., Gong, Y.Z., Liu, C.C.: A static defect checker for interprocedural array bound. Appl. Mech. Mater. 63–64, 808–813 (2011). doi:10.4028/www.scientific.net/AMM.63-64.808

    Article  Google Scholar 

  9. Gampe, A., Ronne, J.V., Niedzielski, D., Vasek, J., Psarris, K.: Safe, multiphase bounds check elimination in Java. Softw. Pract. Experience 41, 753–788 (2011). doi:10.1002/spe.1028

    Article  Google Scholar 

  10. Lin, J.B., Liu, H.: Research of Symbolic Execution. In: National Conference on Computer Security (2013)

    Google Scholar 

  11. Liang, J.J., Liu, J.F., Zhu, D.D., Chen, K.: Software static test research based on symbolic execution. Comput. Technol. Dev. 23, 42–45 (2013). doi:10.3969/j.issn.1673-629X.2013.06.011

    Google Scholar 

  12. Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM 56, 82–90 (2013). doi:10.1145/2408776.2408795

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by National Key R&D Program of China (Grant No. 2016YFB0800700) and National Natural Science Foundation of China (Grant No. U1636115).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiyou Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Shan, C., Sun, S., Xue, J., Hu, C., Zhu, H. (2017). A Detecting Method of Array Bounds Defects Based on Symbolic Execution. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics