Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Static source code analysis

Fisher G (2007) When, why and how to leverage source code analysis tools, http //www.kloc work.com/resources/white-paper/static-analysis-when-why-how. Accessed 11 October 2010 Ganssle J (2010) A guide to code inspections. http //www.ganssle.com/inspections.pdf. Accessed 11 October 2010... [Pg.248]

B8.4 Static Code Analysis Static code analysis is the analysis of the source code before it is executed. Techniques include ... [Pg.310]

Analysis, in this context, covers any proof of requirements satisfaction that is obtained from the design or other representation of the product, including models, prototypes, software source code etc. It includes, for example, simulation, formal proof, hardware reliability prediction, inspection, and software static and dynamic code analysis. [Pg.119]

Static analysis comprising subset analysis, metrics analysis, control flow analysis, data use analysis, information flow analysis, semantic analysis/path function analysis and safety properties analysis shall be performed on the whole of the source code to verify that the source code is well formed and free of anomalies that would affect the safety of the system. [Pg.169]

The following techniques of static analysis may be used to build confidence in the correctness of the source code ... [Pg.56]

Static analysis is a technique (usually automated) which does not involve execution of code but consists of algebraic examination of source code. It involves a succession of procedures whereby the paths through the code, the use of variables, and the algebraic functions of the algorithms are analyzed. There are packages available which carry out the procedures and, indeed, modern compilers frequently carry out some of the static analysis procedures such as data flow analysis. [Pg.89]

As discussed above, for safe stack size analysis it is important to work on fully linked binary code, i.e., here the static analysis is not based on the source code but on the executable code. It approximates the semantics of the machine code of the microprocessor by using an abstract model of the processor architecture. The abstract model does not need to cover the entire state of the microprocessor, only the parts affecting the stack are needed. The hardware state relevant for worst-case stack analysis includes the processor registers and the memory cells. For a naive analysis only the stack pointer register is needed, but for precise results it is important to perform an elaborate value analysis on the contents of processor register and memory cells (cf. Sec. 4.2). In the following we will give an overview of the structure and analysis phases of the tool StackAnalyzer [14,11]. [Pg.206]

Static Analysis tools such as Polyspace by MathWorks [14] and Astree aim at proving absence of runtime errors. They analyze source code to find bugs such as faulty pointer dereferences or infinite loops amongst others. However, they are not aiming for proving general correctness. [Pg.193]

Static analysis tools scan the source code and automatically detect errors that typically pass through compilers and become latent problems, including the following ... [Pg.280]


See other pages where Static source code analysis is mentioned: [Pg.202]    [Pg.280]    [Pg.202]    [Pg.280]    [Pg.91]    [Pg.299]    [Pg.2033]    [Pg.165]    [Pg.166]    [Pg.172]    [Pg.18]    [Pg.19]    [Pg.33]    [Pg.35]    [Pg.51]    [Pg.57]    [Pg.69]    [Pg.69]    [Pg.69]    [Pg.287]    [Pg.204]    [Pg.205]    [Pg.19]    [Pg.87]    [Pg.11]    [Pg.130]    [Pg.3617]   
See also in sourсe #XX -- [ Pg.280 ]




SEARCH



Source analysis

Source code

Static code analysis

© 2024 chempedia.info