@inproceedings{72ca797c108747c4bb7d3672b30fd25f,
title = "A detecting method of array bounds defects based on symbolic execution",
abstract = "Array bounds is the most commonly fault in java programs design, it often leads to wrong results even system crash. To solve these problems, this paper proposed a detecting array bounds method based on symbolic execution. The method generated the abstract syntax tree from the source code, and then created a control flow graph according to the abstract syntax tree. It adopted flaw detectors to detect defects of array bound. Finally, using the standard function to test the ability of this method in detecting array bounds. The results indicated that this method can detect array bounds defects of crossing process indirectly, array bounds defects within process and array bounds defects of crossing process directly very well and it is better than some existing Java methods of detecting array bounds defects.",
keywords = "Array bounds, Software security, Symbolic execution",
author = "Chun Shan and Shiyou Sun and Jingfeng Xue and Changzhen Hu and Hongjin Zhu",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing AG 2017.; 11th International Conference on Network and System Security, NSS 2017 ; Conference date: 21-08-2017 Through 23-08-2017",
year = "2017",
doi = "10.1007/978-3-319-64701-2_27",
language = "English",
isbn = "9783319647005",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "373--385",
editor = "Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola",
booktitle = "Network and System Security - 11th International Conference, NSS 2017, Proceedings",
address = "Germany",
}