Detecting Program Components With Equivalent Behaviors

نویسندگان

  • WUU YANG
  • SUSAN HORWITZ
چکیده

The execution behavior of a program component is defined as the sequence of values produced at the component during program execution. This paper presents an efficient algorithm for detecting program components − in one or more programs − that exhibit identical execution behaviors. The algorithm operates on a new graph representation for programs that combines features of static-single-assignment forms and program dependence graphs. The result provides insight into the relationship between execution behaviors and (control and flow) dependences in the program. The algorithm, called the Sequence-Congruence Algorithm, is applicable to programs written in a language that includes scalar variables and constants, assignment statements, conditional statements, and while-loops. The Sequence-Congruence Algorithm can be used as the basis for an algorithm for integrating program variants.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Association of Road Traffic Noise Exposure and Driving Behaviors

Background: The noise caused by traffic is an increasingly prominent feature of urban environments. However, limited studies have been focused on the assessment of exposure-response relationship between road traffic noise exposure and driving behaviors in Iran. The present study aimed to investigate the prevalence of the violations caused by road traffic noise exposure in Qazvin, Iran. Methods...

متن کامل

A method for detecting the theft of Java programs through analysis of the control flow information

A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information. The control flow information shows the structural characteristics and the possible behaviors during the execution of progr...

متن کامل

Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models

The number of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. However, the effectiveness of current tools depends on the app model as well as the malware detection algorithm that analyzes the app model. If the model and/or the algorithm is inadequate, then sophisticated attacks tha...

متن کامل

Measuring Health Belief Model components in adopting preventive behaviors of cervical cancer

Background & Objective: Cervical cancer is the second prevalent women cancer in the world. This cancer is found preventable because of having the prolong time before the appearance, its complications and the available proper screening program and possibility of the primary lesion treatment. Since the Health Belief Model is one of the applicable praxeology model in health education to prevent an...

متن کامل

Detecting frauds using customer behavior trend analysis and known scenarios

In this paper a fraud detection method is proposed which user behaviors are modeled using two main components namely the un-normal trend analysis component and scenario based component. The extent of deviation of a transaction from his/her normal behavior is estimated using fuzzy membership functions. The results of applying all membership functions on a transaction will then be infused and a f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989