Preview

Dynamic Code Analysis

Powerful Essays
Open Document
Open Document
1554 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dynamic Code Analysis
On Dynamic Code Analysis

Florin PETRESCU*

* Student at “Politehnica” University of Timisoara ** Professor at “Politehnica” University of Timisoara *** Software Developer at Continental Automotive Romania

Abstract - Dynamic code analysis represent the analysis of a software program that is performed through the execution of other computer programs that are built based on the analyzed program and run on a real or virtual processor. The objectives of the dynamic code analysis are to minimize the debugging time and to automatically pinpoint towards the potential errors and explain them as they occur during the program’s execution The aim of this paper is to emphasize the benefits of a dynamic code analyzer realized by implementing a virtual processor that simulates the code execution, together with the detection of the potential execution errors: out of memory requests, infinite loops, recursive calls etc.

Moto “How hard would an auto mechanic's job be if they were never allowed to turn on the car and listen to hear what kind of weird sound it was making, or plug in the diagnostics check while the car was running. That's dynamic analysis.” [Eric JARVI]

I. Introduction

While developing software applications, programmers have to make their programs reliable, and this considering a large number of scenarios and possible configurations. The dynamic code analysis can discover these types of errors and directly pinpoint to the vulnerable spots in the code. The dynamic code analysis represents the investigation of a program’s behavior using the information obtained while the program is executing. The main goal of the dynamic code analysis is to establish which sections of the programs contain potential errors that are not usually found by compiler or by means of static analysis. The objectives of the dynamic code analysis are to minimize the debugging time and to automatically pinpoint to the potential errors and explain them as they

You May Also Find These Documents Helpful

  • Good Essays

    Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    The second category of fault changes individual instructions in the text segment. These faults are intended to approximate the assembly-level manifestation of real C-level programming…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Service Request Sr Rm 004

    • 1582 Words
    • 7 Pages

    This phase requires the coordination and cooperation of many people. The system analyst cannot conduct all the work alone. The first step involves coding. Coding is process of converting writing computer language that tells the system the commands to perform when certain commands are given. As the coding process being, the process of testing is also taking place as well. When coding is written, it must pass validation or the computer will not understand the language and the expect program will not perform to standard. Many strategies are available for testing validation; the size of the system dictates which is best. Throughout the system development life cycle, software testing was taking place after certain events to ensure the preliminary creation was on track. During analysis the overall test plan was developed. In the design phase, the unit test, integration test plan, and a system test plan was developed. Inspections are formal group activities that perform manually to find obvious errors such as syntax and…

    • 1582 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 An Introduction to Hardware, Software, and the Internet An Introduction to Software Development Objects and Classes Algorithms Java Syntax and Style Data Types, Variables, and Arithmetic Boolean Expressions and if-else Statements Iterative Statements: while, for, do–while Implementing Classes and Using Objects Strings Class Hierarchies and Interfaces Arrays…

    • 3908 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    analysis are either built into the operating system, or are available at no cost. Two such tools for…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Better Essays

    7) Global variables make debugging difficult because any statement in a program can change its value.…

    • 1580 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Cs Programming Chapter 1

    • 2450 Words
    • 10 Pages

    ____ errors are relatively easy to locate and correct because the compiler or interpreter you use highlights every error.…

    • 2450 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    o Provide a set of test values that test the abnormal operation of this program segment.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    If you find a suspect executable and wish to perform “dynamic analysis” what does that mean?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    4. Did the static analysis tool find all the potential security flaws in the application?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This pack of IT 240 Latest Version Set (A) Week 1 Discussion Question 2 includes:…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Malware Analysis Paper

    • 2168 Words
    • 9 Pages

    There are three techniques that malware analysts can utilize to conduct malware analysis, static analysis, dynamic analysis, and temporal analysis. According to Sikorski and Honig (2012), static analysis involves examining the file and using a disassembler to reverse engineer malware; while dynamic analysis involves running the malware in a safe environment and using a debugger to analyze executable malware. Temporal analysis is based on analyzing a system over time. Even though static analysis and dynamic analysis can be done separately, its effectiveness in malware analysis is increased if done in conjunction.…

    • 2168 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    The company started out in 1958 as a joint venture with New Zealand Dairy Board. Under this venture, New Zealand Creamery would provide all the local support needed while New Zealand Dairy Board would provide all the technology needed to produce dairy products. Unfortunately, the management teams were not able to agree on all of the terms of the agreement, so the project never materialized. In 1960, the company once again entered into a joint venture with Golden State California which is a part of the Foremost Dairy group of the United States. Hence, the company was now named Golden State Philippines. Under this agreement, Golden State of California was to provide the production and purchasing aspect and Golden State Philippines would provide the marketing and physical Distribution of finished goods. However, due to technical difficulties, Golden State Philippines had to cancel its contract with Golden State California. It was at this point that the founder decided to pursue the existing business by sending his manager t undergo training in Australia and New Zealand in order to gain the technical and production know how. After gaining the valuable education, the company was now ready to go back into business on its own. But with the contract of Golden State Canceled, it had to acquire a company name in order to resume operations in the soonest possible time, and since an application for a business name in the SEC took a long time to process, to owner of the company decided to reactivate the name New Zealand Creamery, in 1962, and ever since then, the company…

    • 1875 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Users, data entry clerks, system operators, and programmers frequently make errors that contribute directly or indirectly to security problems. In some cases, the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, the errors create vulnerabilities. Errors can occur during all phases of the systems life cycle.…

    • 1117 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Sa3Dany

    • 270 Words
    • 2 Pages

    Trace the following code showing the changes in the value of each variable as the instructions are executed and the output displayed on the screen. Use '-' to show the width of the output field. (To get full grade you have to show all tracing steps)…

    • 270 Words
    • 2 Pages
    Satisfactory Essays