Automated behavior computation for software analysis and validation

Mark Pleszkoch, Richard Linger, Stacy Prowell, Kirk Sayre, Luanne Burns

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Software systems can exhibit massive numbers of execution paths, and even comprehensive testing can exercise only a small fraction of these. It is no surprise that systems experience errors and vulnerabilities in use when many executions are untested. Computations over the functional semantics of programs may offer a potential solution. Structured programs are expressed in a finite hierarchy of control structures, each of which corresponds to a mathematical function or relation. A correctness theorem defines transformation of these structures from procedural logic into nonprocedural, as-built specifications of behavior. These computed specifications enumerate behavior for all circumstances of use and cover the behavior space. Automation of these computations affords a new means for validating software functionality and security properties. This paper describes theory and implementation for loop behavior computation in particular, and illustrates use of an automated behavior computation system to validate a miniature looping program with and without embedded malware.

Original languageEnglish
Title of host publicationProceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45
PublisherIEEE Computer Society
Pages5537-5545
Number of pages9
ISBN (Print)9780769545257
DOIs
StatePublished - 2012
Event2012 45th Hawaii International Conference on System Sciences, HICSS 2012 - Maui, HI, United States
Duration: Jan 4 2012Jan 7 2012

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605

Conference

Conference2012 45th Hawaii International Conference on System Sciences, HICSS 2012
Country/TerritoryUnited States
CityMaui, HI
Period01/4/1201/7/12

Fingerprint

Dive into the research topics of 'Automated behavior computation for software analysis and validation'. Together they form a unique fingerprint.

Cite this