Detecting Program Components With Equivalent Behaviors
نویسندگان
چکیده
The execution behavior of a program component is defined as the sequence of values produced at the component during program execution. This paper presents an efficient algorithm for detecting program components − in one or more programs − that exhibit identical execution behaviors. The algorithm operates on a new graph representation for programs that combines features of static-single-assignment forms and program dependence graphs. The result provides insight into the relationship between execution behaviors and (control and flow) dependences in the program. The algorithm, called the Sequence-Congruence Algorithm, is applicable to programs written in a language that includes scalar variables and constants, assignment statements, conditional statements, and while-loops. The Sequence-Congruence Algorithm can be used as the basis for an algorithm for integrating program variants.
منابع مشابه
Association of Road Traffic Noise Exposure and Driving Behaviors
Background: The noise caused by traffic is an increasingly prominent feature of urban environments. However, limited studies have been focused on the assessment of exposure-response relationship between road traffic noise exposure and driving behaviors in Iran. The present study aimed to investigate the prevalence of the violations caused by road traffic noise exposure in Qazvin, Iran. Methods...
متن کاملA method for detecting the theft of Java programs through analysis of the control flow information
A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information. The control flow information shows the structural characteristics and the possible behaviors during the execution of progr...
متن کاملDexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models
The number of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. However, the effectiveness of current tools depends on the app model as well as the malware detection algorithm that analyzes the app model. If the model and/or the algorithm is inadequate, then sophisticated attacks tha...
متن کاملMeasuring Health Belief Model components in adopting preventive behaviors of cervical cancer
Background & Objective: Cervical cancer is the second prevalent women cancer in the world. This cancer is found preventable because of having the prolong time before the appearance, its complications and the available proper screening program and possibility of the primary lesion treatment. Since the Health Belief Model is one of the applicable praxeology model in health education to prevent an...
متن کاملDetecting frauds using customer behavior trend analysis and known scenarios
In this paper a fraud detection method is proposed which user behaviors are modeled using two main components namely the un-normal trend analysis component and scenario based component. The extent of deviation of a transaction from his/her normal behavior is estimated using fuzzy membership functions. The results of applying all membership functions on a transaction will then be infused and a f...
متن کامل