The Static Analysis of the Uniqueness of Polymorphism

2013 ◽  
Vol 411-414 ◽  
pp. 425-431
Author(s):  
Yong Min Mu ◽  
Xu Li Zhu ◽  
Meng Ting Liu ◽  
Zhi Hua Zhang

The existence of the polymorphism brings many changes on the executable paths of the object-oriented program, which makes it difficult to test the internal communication of the system and the interaction between the objects. This paper analyzes the structure feature of the Java program and builds an inheritance tree using the technique of reflection in Java, which guarantees the accuracy of the analysis data. This paper proposes an algorithm to determine the uniqueness based on the full analysis of the Java polymorphic calling states and the Liskov substitution principle. And the algorithm uses the asynchronous mode of high concurrency to increase the efficiency. The result shows the algorithm can determine the uniqueness of polymorphism efficiently and accurately. It can play an important role in the Java program comprehension and the system maintenance.

2011 ◽  
Vol 11 (3) ◽  
Author(s):  
Melinda Tóth ◽  
István Bozó ◽  
Judit Kőszegi ◽  
Zoltán Horváth

2012 ◽  
Vol 271-272 ◽  
pp. 674-678
Author(s):  
Yong Yong Sun ◽  
Guang Qiu Huang

Software protection technology is necessary for software security and property right of software. The algorithm of code obfuscation based on class is proposed that uses of obfuscation technology. The overall architecture of the system is hidden by changing the class diagram for class aggregation, and the algorithm of class aggregation can be used to design class hierarchy in object-oriented program. It makes static analysis difficult while preserving function of program. The interfaces replace original classes to achieve reference in order to implement type hidden, and automatic analysis becomes more difficult.


2014 ◽  
Vol 608-609 ◽  
pp. 23-30
Author(s):  
Qing Kai Jin ◽  
Jun Yi Li ◽  
Yan Zhang

For the redundant codes caused by software reuse and rapid development in object-oriented program, the paper proposes a cutting model and designs a cutting scheme based on this model. Firstly, a cutting model is established. Then, static analysis is made for object-oriented codes and the cutting information base of objects to be clipped is established. Lastly, the cutting information base and cutting model is matched to cut the program. A test on a practical java project indicates that the cutting scheme can make the volume of the project reduce by about 21%.


2008 ◽  
Vol 2 (2) ◽  
pp. 96-104
Author(s):  
Yen-Hui Li ◽  
◽  
Meng-Chang Chan ◽  
An-Chen Lee ◽  
◽  
...  

This paper develops an SECS Communication Module, which conforms to SEMI standard, using the Object-oriented Analysis/Design (OOA/D) method. The two main features of SECS Communication Module are Unified Modeling Language (UML) and Design Patterns for developing flexible and reusable software architecture and JAVA program language for implementing SECS Communication Module. The developed SECS communication module can not only be integrated into cluster tool control but can also run stand-alone in a communication equipment.


2012 ◽  
Vol 271-272 ◽  
pp. 636-640
Author(s):  
Yong Yong Sun ◽  
Guang Qiu Huang

The security of software is threatened by piracy, tampering and reverse engineering. Attackers attempt to get important algorithms and sensitive data of software by static analysis or reverse engineering. Software protection becomes an important problem. The algorithm of code obfuscation based on class splitting is proposed that uses of obfuscation technology. The definition of class splitting and realization on algorithm are described. At the same time, the performance on algorithm is analyzed. The obfuscation method enhances the degree of complication about program and static analysis becomes more difficult. The algorithm is applicable to object-oriented program with class structure.


Author(s):  
Paulo Meirelles ◽  
Lucas Kanashiro ◽  
Athos Ribeiro ◽  
David Silva ◽  
Antonio Terceiro

Sign in / Sign up

Export Citation Format

Share Document