[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/HICSS.2009.228guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification

Published: 05 January 2009 Publication History

Abstract

The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software developers lack practical means to determine the full functional behavior of programs under development, and even the most thorough testing can provide only partial knowledge of behaviors. Thus, an effective technology for revealing software behaviors could have a positive impact on software understanding. This paper describes the emerging technology of function extraction (FX) for computing the functional behavior of programs and how the knowledge of program behavior can be used in user-directed program exploration for understanding and verification. We explore how the use of FX technologies can transform methods for functional verification of software. Several examples are presented illustrating the FXplorer interface and its use in exploring the behavior of programs, a capability that, without function extraction technology, has not been possible until now.

Cited By

View all
  • (2013)Computing legacy software behavior to understand functionality and security propertiesProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop10.1145/2459976.2460025(1-4)Online publication date: 8-Jan-2013
  • (2011)Behavior computation for smart grid software analysisProceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research10.1145/2179298.2179354(1-1)Online publication date: 12-Oct-2011
  • (2009)Computing the behavior of malicious code with function extraction technologyProceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies10.1145/1558607.1558648(1-2)Online publication date: 13-Apr-2009

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
HICSS '09: Proceedings of the 42nd Hawaii International Conference on System Sciences
January 2009
4812 pages
ISBN:9780769534503

Publisher

IEEE Computer Society

United States

Publication History

Published: 05 January 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Computing legacy software behavior to understand functionality and security propertiesProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop10.1145/2459976.2460025(1-4)Online publication date: 8-Jan-2013
  • (2011)Behavior computation for smart grid software analysisProceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research10.1145/2179298.2179354(1-1)Online publication date: 12-Oct-2011
  • (2009)Computing the behavior of malicious code with function extraction technologyProceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies10.1145/1558607.1558648(1-2)Online publication date: 13-Apr-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media