Project/Area Number |
12680348
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Single-year Grants |
Section | 一般 |
Research Field |
計算機科学
|
Research Institution | Osaka University |
Principal Investigator |
INOUE Katsuro Osaka University, Graduate School of Engineering Science, Professor, 大学院・基礎工学研究科, 教授 (20168438)
|
Co-Investigator(Kenkyū-buntansha) |
MATSUSHITA Makoto Osaka University, Graduate School of Engineering Science, Research Associate, 大学院・基礎工学研究科, 助手 (60304028)
KUSUMOTO Shinji Osaka University, Graduate School of Engineering Science, Associate Professor, 大学院・基礎工学研究科, 助教授 (30234438)
|
Project Period (FY) |
2000 – 2001
|
Project Status |
Completed (Fiscal Year 2001)
|
Budget Amount *help |
¥3,200,000 (Direct Cost: ¥3,200,000)
Fiscal Year 2001: ¥1,300,000 (Direct Cost: ¥1,300,000)
Fiscal Year 2000: ¥1,900,000 (Direct Cost: ¥1,900,000)
|
Keywords | Program Slice / Alias Analysis / Information Security / Impact Analysis / Object-Oriented Program Language / Java / プログラム解析 / Javaプログラム / バイトコード / データ依存解析 |
Research Abstract |
In this research, we cope with some kids of software modeling which give consideration to static and/or dynamic aspects of software. Followings are our research results : We propose "DC Slice" algorithm which employs both static-type and dynamic-type sub-algorithms, that is to analyze program to generate software's control and data flows graphs. The results of control and data flow graphs of DC Slice algorithm is equivalence of the one of dynamic slice algorithm, however, the cost of DC slice algorithm is lower than dynamic one. We also implement a system to display the results of DC slice algorithm. Using this system, we can analyze software without having its source code. We propose "JAAT", a system for alias analysis which provides to the users to choice several alias analysis algorithms easily. JAAT's software' s alias model is extremely precise with reasonable costs. We implement an algorithm of software' s information security model for procedural programming languages, and a system for displaying information security model. We also re-define the algorithm to apply object-oriented programming languages. We propose an impact analysis algorithm that analyzes impacts of the software when some changes are committed to. We also implement a system of displaying impact analysis results.
|