[1] STAVNYCHA M, YIN H, RÖMER T. A large-scale survey on the effects of selected development practices on software correctness[C]//Proceedings of the 2015 International Conference on Software and SystemProcess. New York: ACM, 2015: 117-121. [2] McDONALD J T, TRIGG T H, ROBERTS C E, et al. Security in agile development: pedagogic lessons from an undergraduate software engineering case study[C]//CSS 2015: Proceedings of the Second International Symposium on Cyber Security. Berlin: Springer, 2015: 127-141. [3] D'SILVA V, KROENING D, WEISSENBACHER G. A survey of automated techniques for formal software verification[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2008, 27(7): 1165-1178. [4] 郭曦, 王盼, 王建勇, 等.基于k近邻最弱前置条件的程序多路径验证方法[J]. 计算机学报, 2015, 33(11):2203-2214.(GUO X, WANG P, WANG J Y, et al. Program multiple execution paths verification based on k proximity weakest precondition[J]. Chinese Journal of Computers, 2015, 33(11):2203-2214.) [5] YANG G, DWYER M B, ROTHERMEL G. Regression model checking[C]//ICSM 2009: Proceedings of the 2009 IEEE International Conference on Software Maintenance. Piscataway, NJ: IEEE, 2009: 115-124. [6] HARRIS W R, SANKARANARAYANAN S, IVANCIC F, et al. Program analysis via satisfiability modulo path programs[C]//POPL 2010: Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 2010: 71-82. [7] MUDDULURU R, RAMANATHAN M K. Efficient incremental static analysis using path abstraction[M]//Fundamental Approaches to Software Engineering. Berlin: Springer, 2014: 125-139. [8] HENRY J. Static analysis by path focusing[D]. Grenoble: Grenoble INP, 2011:15-41. [9] 何炎祥, 吴伟, 陈勇, 等.基于SMT求解器的路径敏感程序验证[J]. 软件学报, 2012, 23(10):2655-2664.(HE Y X, WU W, CHEN Y, et al. Path sensitive program verification based on SMT solvers[J]. Journal of Software, 2012, 23(10):2655-2664.) [10] GARG P, NEIDER D, MADHUSUDAN P, et al. Learning invariants using decision trees and implication counterexamples[C]//Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 2016: 499-512. [11] FLOYD R W. Assigning meanings to programs[C]//Proceedings of Symposia in Applied Mathematics. Providence: American Mathematical Society, 1967:19-32. [12] DIJKSTRA E W. A Discipline of Programming[M]. Englewood Cliffs: Prentice-hall, 1976:7-40. [13] COUSOT P, COUSOT R, MAUBORGNE L. Theories, solvers and static analysis by abstract interpretation[J]. Journal of the ACM, 2012, 59(6): 31. [14] KRISHNA S, PUHRSCH C, WIES T. Learning invariants using decision trees[EB/OL]. [2015-10-10]. http://arxiv.org/abs/1501.04725. [15] SCHRÖDER M S, GUSENLEITNER D, QUACKENBUSH J, et al. RamiGO: an R/Bioconductor package providing an AmiGO visualize interface[J]. Bioinformatics, 2013, 29(5):666-668. [16] 姜冶, 管仁初, 梁艳春.整合Dmoz和Yahoo标签的BNF文法及其实现[J]. 计算机工程与设计, 2009, 30(19):4520-4523.(JIANG Y, GUAN R C, LIANG Y C. BNF syntax unifying Dmoz and Yahoo syntax and its implementation[J]. Computer Engineering and Design, 2009, 30(19):4520-4523.) [17] CADAR C, SEN K. Symbolic execution for software testing: three decades later[J]. Communications of the ACM, 2013, 56(2): 82-90. [18] 季晓慧, 张健.约束问题求解[J]. 自动化学报, 2007, 33(2):125-131.(JI X H, ZHANG J. Constraint processing[J]. Acta Automatica Sinica, 2007, 33(2):125-131.) [19] 康文涛.符号执行工具KLEE约束求解优化设计与实现[D]. 成都:电子科技大学, 2014:25-59.(KANG W T. Optimization of constraint solver for KLEE, a dynamic symbolic execution tool[D]. Chengdu: University of Electronic Science and Technology of China, 2014:25-59.) [20] KROENING D, TAUTSCHNIG M. CBMC-C bounded model checker[M]//Tools and Algorithms for the Construction and Analysis of Systems. Berlin: Springer, 2014: 389-391. [21] ARMANDO A, MANTOVANI J, PLATANIA L. Bounded model checking of software using SMT solvers instead of SAT solvers[J]. International Journal on Software Tools for Technology Transfer, 2009, 11(1):69-83. [22] SNU real-time benchmarks[EB/OL]. [2015-10-10]. http://www.cprover.org/goto-cc/examples/snu.html. |