Static program analysis

In computer science, static program analysis (also known as static analysis or static simulation) is the analysis of computer programs performed without executing them, in contrast with dynamic program analysis, which is performed on programs during their execution in the integrated environment.[1][2]

The term is usually applied to analysis performed by an automated tool, with human analysis typically being called "program understanding", program comprehension, or code review. In the last of these, software inspection and software walkthroughs are also used. In most cases the analysis is performed on some version of a program's source code, and, in other cases, on some form of its object code.

Rationale

The sophistication of the analysis performed by tools varies from those that only consider the behaviour of individual statements and declarations,[3] to those that include the complete source code of a program in their analysis. The uses of the information obtained from the analysis vary from highlighting possible coding errors (e.g., the lint tool) to formal methods that mathematically prove properties about a given program (e.g., its behaviour matches that of its specification).

Software metrics and reverse engineering can be described as forms of static analysis. Deriving software metrics and static analysis are increasingly deployed together, especially in creation of embedded systems, by defining so-called software quality objectives.[4]

A growing commercial use of static analysis is in the verification of properties of software used in safety-critical computer systems and locating potentially vulnerable code.[5] For example, the following industries have identified the use of static code analysis as a means of improving the quality of increasingly sophisticated and complex software:

  1. Medical software: The US Food and Drug Administration (FDA) has identified the use of static analysis for medical devices.[6]
  2. Nuclear software: In the UK the Office for Nuclear Regulation (ONR) recommends the use of static analysis on reactor protection systems.[7]
  3. Aviation software (in combination with dynamic analysis).[8]
  4. Automotive & Machines (functional safety features form an integral part of each automotive product development phase, ISO 26262, section 8).

A study in 2012 by VDC Research reported that 28.7% of the embedded software engineers surveyed use static analysis tools and 39.7% expect to use them within 2 years.[9] A study from 2010 found that 60% of the interviewed developers in European research projects made at least use of their basic IDE built-in static analyzers. However, only about 10% employed an additional other (and perhaps more advanced) analysis tool.[10]

In the application security industry the name static application security testing (SAST) is also used. SAST is an important part of Security Development Lifecycles (SDLs) such as the SDL defined by Microsoft[11] and a common practice in software companies.[12]

Tool types

The OMG (Object Management Group) published a study regarding the types of software analysis required for software quality measurement and assessment. This document on "How to Deliver Resilient, Secure, Efficient, and Easily Changed IT Systems in Line with CISQ Recommendations" describes three levels of software analysis.[13]

Unit Level
Analysis that takes place within a specific program or subroutine, without connecting to the context of that program.
Technology Level
Analysis that takes into account interactions between unit programs to get a more holistic and semantic view of the overall program in order to find issues and avoid obvious false positives.
System Level
Analysis that takes into account the interactions between unit programs, but without being limited to one specific technology or programming language.

A further level of software analysis can be defined.

Mission/Business Level
Analysis that takes into account the business/mission layer terms, rules and processes that are implemented within the software system for its operation as part of enterprise or program/mission layer activities. These elements are implemented without being limited to one specific technology or programming language and in many cases are distributed across multiple languages, but are statically extracted and analyzed for system understanding for mission assurance.

Formal methods

Formal methods is the term applied to the analysis of software (and computer hardware) whose results are obtained purely through the use of rigorous mathematical methods. The mathematical techniques used include denotational semantics, axiomatic semantics, operational semantics, and abstract interpretation.

By a straightforward reduction to the halting problem, it is possible to prove that (for any Turing complete language), finding all possible run-time errors in an arbitrary program (or more generally any kind of violation of a specification on the final result of a program) is undecidable: there is no mechanical method that can always answer truthfully whether an arbitrary program may or may not exhibit runtime errors. This result dates from the works of Church, Gödel and Turing in the 1930s (see: Halting problem and Rice's theorem). As with many undecidable questions, one can still attempt to give useful approximate solutions.

Some of the implementation techniques of formal static analysis include:[14]

Data-driven static analysis

Data-driven static analysis leverages extensive codebases to infer coding rules and improve the accuracy of the analysis.[16][17] For instance, one can use all Java open-source packages available on GitHub to learn good analysis strategies. The rule inference can use machine learning techniques.[18] It is also possible to learn from a large amount of past fixes and warnings.[16]

Remediation

Static analyzers produce warnings. For certain types of warnings, it is possible to design and implement automated remediation techniques. For example, Logozzo and Ball have proposed automated remediations for C# cccheck.[19]

See also

References

  1. ^ Wichmann, B. A.; Canning, A. A.; Clutterbuck, D. L.; Winsbarrow, L. A.; Ward, N. J.; Marsh, D. W. R. (Mar 1995). "Industrial Perspective on Static Analysis" (PDF). Software Engineering Journal. 10 (2): 69–75. doi:10.1049/sej.1995.0010. Archived from the original (PDF) on 2011-09-27.
  2. ^ Egele, Manuel; Scholte, Theodoor; Kirda, Engin; Kruegel, Christopher (2008-03-05). "A survey on automated dynamic malware-analysis techniques and tools". ACM Computing Surveys. 44 (2): 6:1–6:42. doi:10.1145/2089125.2089126. ISSN 0360-0300. S2CID 1863333.
  3. ^ Khatiwada, Saket; Tushev, Miroslav; Mahmoud, Anas (2018-01-01). "Just enough semantics: An information theoretic approach for IR-based software bug localization". Information and Software Technology. 93: 45–57. doi:10.1016/j.infsof.2017.08.012.
  4. ^ "Software Quality Objectives for Source Code" Archived 2015-06-04 at the Wayback Machine (PDF). Proceedings: Embedded Real Time Software and Systems 2010 Conference, ERTS2010.org, Toulouse, France: Patrick Briand, Martin Brochet, Thierry Cambois, Emmanuel Coutenceau, Olivier Guetta, Daniel Mainberte, Frederic Mondot, Patrick Munier, Loic Noury, Philippe Spozio, Frederic Retailleau.
  5. ^ Improving Software Security with Precise Static and Runtime Analysis Archived 2011-06-05 at the Wayback Machine (PDF), Benjamin Livshits, section 7.3 "Static Techniques for Security". Stanford doctoral thesis, 2006.
  6. ^ FDA (2010-09-08). "Infusion Pump Software Safety Research at FDA". Food and Drug Administration. Archived from the original on 2010-09-01. Retrieved 2010-09-09.
  7. ^ Computer based safety systems - technical guidance for assessing software aspects of digital computer based protection systems, "Computer based safety systems" (PDF). Archived from the original (PDF) on January 4, 2013. Retrieved May 15, 2013.
  8. ^ Position Paper CAST-9. Considerations for Evaluating Safety Engineering Approaches to Software Assurance Archived 2013-10-06 at the Wayback Machine // FAA, Certification Authorities Software Team (CAST), January, 2002: "Verification. A combination of both static and dynamic analyses should be specified by the applicant/developer and applied to the software."
  9. ^ VDC Research (2012-02-01). "Automated Defect Prevention for Embedded Software Quality". VDC Research. Archived from the original on 2012-04-11. Retrieved 2012-04-10.
  10. ^ Prause, Christian R., René Reiners, and Silviya Dencheva. "Empirical study of tool support in highly distributed research projects." Global Software Engineering (ICGSE), 2010 5th IEEE International Conference on. IEEE, 2010 https://ieeexplore.ieee.org/Xplore/login.jsp?url=%2Fielx5%2F5581168%2F5581493%2F05581551.pdf&authDecision=-203
  11. ^ M. Howard and S. Lipner. The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software. Microsoft Press, 2006. ISBN 978-0735622142
  12. ^ Achim D. Brucker and Uwe Sodan. Deploying Static Application Security Testing on a Large Scale Archived 2014-10-21 at the Wayback Machine. In GI Sicherheit 2014. Lecture Notes in Informatics, 228, pages 91-101, GI, 2014.
  13. ^ "OMG Whitepaper | CISQ - Consortium for Information & Software Quality" (PDF). Archived (PDF) from the original on 2013-12-28. Retrieved 2013-10-18.
  14. ^ Vijay D’Silva; et al. (2008). "A Survey of Automated Techniques for Formal Software Verification" (PDF). Transactions On CAD. Archived (PDF) from the original on 2016-03-04. Retrieved 2015-05-11.
  15. ^ Jones, Paul (2010-02-09). "A Formal Methods-based verification approach to medical device software analysis". Embedded Systems Design. Archived from the original on July 10, 2011. Retrieved 2010-09-09.
  16. ^ a b "Learning from other's mistakes: Data-driven code analysis". www.slideshare.net. 13 April 2015.
  17. ^ Söderberg, Emma; Church, Luke; Höst, Martin (2021-06-21). "Open Data-driven Usability Improvements of Static Code Analysis and its Challenges". Evaluation and Assessment in Software Engineering. EASE '21. New York, NY, USA: Association for Computing Machinery. pp. 272–277. doi:10.1145/3463274.3463808. ISBN 978-1-4503-9053-8.
  18. ^ Oh, Hakjoo; Yang, Hongseok; Yi, Kwangkeun (2015). "Learning a strategy for adapting a program analysis via bayesian optimisation". Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications - OOPSLA 2015. pp. 572–588. doi:10.1145/2814270.2814309. ISBN 9781450336895. S2CID 13940725.
  19. ^ Logozzo, Francesco; Ball, Thomas (2012-11-15). "Modular and verified automatic program repair". ACM SIGPLAN Notices. 47 (10): 133–146. doi:10.1145/2398857.2384626. ISSN 0362-1340.

Further reading

Read other articles:

DARDO (Bahasa italia: Dart) adalah Close-in weapon system (CIWS), ini dibangun oleh perusahaan asal Italia Breda and Oto Melara. Hal ini terdiri dari: dua Breda Bofors (ukuran 40 mm) firing high explosive (HE) shells fire-control radar (RTN-10X) fire-control system (RTN-20X dan Dardo). Ini adalah yang terakhir dari serangkaian panjang Italia senjata anti-pesawat yang berasal dari autocannon Bofors 40 mm Swedia (dipasang pada Breda seperti Type 64, Type 106, Type 107, Type 564 dan Type 520). ...

 

Konstantinos Mitroglou Informasi pribadiTanggal lahir 12 Maret 1988 (umur 36)Tempat lahir Kavala, YunaniTinggi 1,88 m (6 ft 2 in)Posisi bermain StrikerInformasi klubKlub saat ini Atromitos F.C.Nomor 23Karier junior2004–2005 MSV Duisburg II2005–2007 Borussia Mönchengladbach IIKarier senior*Tahun Tim Tampil (Gol)2004-2005 MSV Duisburg II 12 (5)2005–2007 Borussia Mönchengladbach II 35 (38)2007– Olympiacos 48 (16)2010–2011 → Panionios (pinjaman) 11 (8)2011– �...

 

Citra satelit dari Kawasan Metropolitan Bangkok : Daerah perkotaan di tepi dan sepanjang jalan arteri merupakan ruang desakota. Sebuah jalur batas kota desa pinggiran kota yang terletak di Distrik Baiyun, Guangzhou, Tiongkok. Baiyun terkenal oleh penduduk setempat sebagai daerah desakota di Guangzhou . Desakota adalah istilah yang digunakan dalam geografi perkotaan yang digunakan untuk mendeskripsikan wilayah di antara lingkungan kota-kota besar. Daerah desakota ini berada di wilayah per...

Electronic game of memory skill This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Simon game – news · newspapers · books · scholar · JSTOR (January 2009...

 

Holy Cities of Judaism Nineteenth-century out-of scale map of the four cities: Jerusalem at top right, Hebron beneath it, the Jordan River running top to bottom, Safed at top left, and Tiberias beneath it. The Four Holy Cities of Judaism are the cities of Jerusalem, Hebron, Safed and Tiberias, which were the four main centers of Jewish life after the Ottoman conquest of Palestine.[1] According to the 1906 Jewish Encyclopedia: Since the sixteenth century the Holiness of Palestine, espe...

 

His Excellency the HonourableKim BeazleyAC Gubernur Australia Barat ke-33PetahanaMulai menjabat 1 Mei 2018Penguasa monarkiElizabeth IIPerdana MenteriMark McGowanPendahuluKerry SandersonPenggantiPetahanaDuta Besar Australia untuk Amerika SerikatMasa jabatan17 Februari 2010 – 22 Januari 2016Perdana MenteriKevin RuddJulia GillardKevin RuddTony AbbottMalcolm TurnbullPendahuluDennis RichardsonPenggantiJoe HockeyPemimpim OposisiMasa jabatan28 Januari 2005 – 4 Desember ...

County in North Carolina, United States Not to be confused with Graham, North Carolina. County in North CarolinaGraham CountyCountyGraham County Courthouse in Robbinsville SealMotto: With A Proud History That Runs As Deep As The Roots of Her TreesLocation within the U.S. state of North CarolinaNorth Carolina's location within the U.S.Coordinates: 35°21′N 83°50′W / 35.35°N 83.83°W / 35.35; -83.83Country United StatesState North CarolinaFounded1872...

 

Disambiguazione – Se stai cercando altri significati, vedi Forte, Fortezza (disambigua) o Fortino (disambigua). Fortezza Vecchia di Livorno Una fortezza è una costruzione militare progettata con una funzione tattica difensiva. Le fortezze sono state utilizzate per migliaia di anni, in una varietà di forme sempre più complesse. Un'opera difensiva con caratteristiche simili alla fortezza, ma in genere con dimensioni inferiori, viene chiamata forte o fortino. Indice 1 Descrizione 2...

 

Zdeněk Zeman Zeman alla guida del Foggia nel 1992 Nazionalità  Cecoslovacchia Rep. Ceca (dal 1993) Altezza 181 cm Calcio Ruolo Allenatore CarrieraGiovanili 19??-19?? Slavia PragaCarriera da allenatore 1969-1970 Cinisi1970-1971 Bacigalupo1971-1972 Carini1972-1973 Misilmeri1973-1974 Esakalsa1974-1983 PalermoGiovanili1983-1986 Licata1986-1987 Foggia1987 Parma1988-1989 Messina1989-1994 Foggia1994-1997 Lazio1997-1999 Roma1999-2000 Fene...

МифологияРитуально-мифологическийкомплекс Система ценностей Сакральное Миф Мономиф Теория основного мифа Ритуал Обряд Праздник Жречество Мифологическое сознание Магическое мышление Низшая мифология Модель мира Цикличность Сотворение мира Мировое яйцо Мифическое �...

 

この記事は検証可能な参考文献や出典が全く示されていないか、不十分です。出典を追加して記事の信頼性向上にご協力ください。(このテンプレートの使い方)出典検索?: コルク – ニュース · 書籍 · スカラー · CiNii · J-STAGE · NDL · dlib.jp · ジャパンサーチ · TWL(2017年4月) コルクを打ち抜いて作った瓶の栓 コルク(木栓、�...

 

WWE two-part television special NXT Gold RushPromotionWWEBrand(s)NXTDateJune 20 and 27, 2023CityOrlando, FloridaVenueWWE Performance CenterNXT special episodes chronology ← PreviousSpring Breakin' Next →Heatwave NXT Gold Rush was a professional wrestling television special produced by WWE. It was held primarily for wrestlers from the NXT brand division. Gold Rush aired as a two-part special episode of NXT on the USA Network, taking place live on June 20 and 27, 2023, at the WWE ...

Gangan humbut adalah makanan yang sering disajikan sebagai menu wajib jika ada hajatan/acara perkawinan/upacara kematian.[1] Gangan humbut merupakan sayur tradisional kalimantan yang memiliki cita rasa yang manis. Makanan ini juga merupakan makanan yang biasa dijual pada bulan Ramadan untuk hidangan berbuka puasa. Cara pembuatan Menggunakan bahan sayur berupa labu dan bahan utamanya batang kelapa muda yang disebut humbut. Diolah dengan ikan gabus atau lebih populer dengan sebutan ikan...

 

  提示:此条目页的主题不是沙菲宜阿都拉。 这是马来族人名,“阿达”是父名,不是姓氏,提及此人时应以其自身的名“莫哈末·沙菲益”为主。 尊敬的拿督斯里哈芝沙菲益阿达Mohd Shafie bin Hj. Apdal国会议员、州议员马来西亚国会下议院仙本那现任就任日期1995年4月26日前任山卡兰丹戴(馬來語:Sakaran Dandai)(国阵巫统)多数票12,218(1995)13,325(1999)13,319(2004)17,...

 

Ця стаття потребує додаткових посилань на джерела для поліпшення її перевірності. Будь ласка, допоможіть удосконалити цю статтю, додавши посилання на надійні (авторитетні) джерела. Зверніться на сторінку обговорення за поясненнями та допоможіть виправити недоліки. Мат...

Aerial warfare branch of Belarus' armed forces Air Force and Air Defence Forces of the Republic of BelarusВаенна-паветраныя сілы і войскі супрацьпаветранай абароны Рэспублікі Беларусь (Belarusian)Военно-воздушные силы и войска противовоздушной обороны Республики Беларусь (Russian)The badge of the Belarusian Air ForceFounded15 June 1992;...

 

1994 video gameSimTower: The Vertical EmpireDeveloper(s)OPeNBooKPublisher(s)JP: OPeNBooKNA/EU: MaxisDirector(s)Yoot SaitoSeriesSimPlatform(s)Windows, Macintosh, Saturn, 3DOReleaseWindows, MacJP: 1994NA: November 1994EU: 1994Sega SaturnJP: March 1, 19963DOJP: March 29, 1996Genre(s)Construction and management simulationMode(s)Single-player SimTower: The Vertical Empire (originally published in Japan as The Tower[a]) is a construction and management simulation video game developed by OPe...

 

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Bilingualism in Hong Kong – news · newspapers · books · scholar · JSTOR (July 2010) (Learn how and when to remove this message) Demographics and culture of Hong Kong Demographics Census Health Hongkongers Hong Kong resident Hong Kong identity card Languages Rel...

أحاديالأحاديمعلومات عامةالنوع مضلع منتظمالحواف 1رمز شليفلي {1}مخطط كوكستير أو زمرة تناظرات [ ], Csثنائيتعديل - تعديل مصدري - تعديل ويكي بيانات في الهندسة الرياضية، المضلع الأحادي هو مضلع له ضلع واحد ورأس واحد.[1] وبما أن المضلع الأحادي له ضلع واحد وزاوية واحد فيعتبر مضلع من...

 

Danny SugermanBackground informationBirth nameDaniel Stephen SugermanBorn(1954-10-11)October 11, 1954OriginLos Angeles, California, U.S.DiedJanuary 5, 2005(2005-01-05) (aged 50)Los Angeles, California, U.S.Occupation(s)Music managerYears active1967–2005Musical artist Daniel Stephen Sugerman (October 11, 1954 – January 5, 2005) was the second manager of the Los Angeles–based rock band the Doors. He wrote several books about Jim Morrison and the Doors, including No One Here Gets Out ...