Fig. 1. Example of MISRA Rule Avoidance
Fig. 2. Defect Detection Ratio of Coding Rule
Fig. 3. Defect Detection Ratio of CWE Check
Fig. 6. Example of an Atomicity Violation due to using Variable
Fig. 7. Defect Detection Ratio of Runtime Error Static Analysis Tools
Fig. 5. Example of a Message Deadlock
Table 1. Dynamic Software Defects
Table 2. Static Analysis Target
Table 3. Target Applications
Table 4. Dynamic and Static Tools
Fig. 4. Defect Detection Ratio of Dynamic Defect Detection Tools
References
- J. Kim, S. Jeong, I. Hwang, H. Cho, D. Kim, and Y. J. Jang, "M&S Verification, Validation and Accreditation Research Direction Considering the Characteristics of Defense M&S," Journal of Korean Institute of Industrial Engineers, Vol.39, No.6, pp.486-497, 2013. https://doi.org/10.7232/JKIIE.2013.39.6.486
- Kyeongyoun Kwon, Joonseok Joo, Taesik Kim, Jinwoo Oh, and Jihyun Baek, "A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process," Journal of KIISE, Vol.42, No.7, pp.860-867, 2015. https://doi.org/10.5626/JOK.2015.42.7.860
- Weapon System Software Development and Management Manual, "Defense Acquisition Program Administration Manual No.2017-8," 2017.
- Jihyun Park and Byoungju Choi, "Analysis on Dynamic Software Defects for Increasing Weapon System Reliability," Journal of KIPS Tr. Software and Data Eng., Vol.7, No.7, pp. 249-258, 2018.
- Motor Industry Software Reliability Association. MISRA C 2012: Guidelines for the Use of the C Language in Critical Systems: March 2013. Motor Industry Research Association, 2013.
- S. N. Cant, D. R. Jeffery, and B. Henderson-Sellers, "A Conceptual Model of Cognitive Complexity of Elements of the Programming Process," Information and Software Technology, Vol.37, No.7, pp.351-362, 1995. https://doi.org/10.1016/0950-5849(95)91491-H
- Jooyoung Seo, Byoungju Choi, and Suengwan Yang, "A Profiling Merhod by PCB Hooking and its Application for Memory Fault Detection in Embedded System Operational Test," Journal of Information and Software Technology, Vol. 53, No.1, pp.106-117, Jan. 2011. https://doi.org/10.1016/j.infsof.2010.09.003
- Jooyoung Seo, Byoungju Choi, and Sihyun Lee, "Software Generated Device Exception for more Intensive Devicerelated Software Testing: An Industrial Field Study," Journal of Systems and Software, Vol.86, No.12, pp. 3193-3212, Dec. 2013. https://doi.org/10.1016/j.jss.2013.07.058
- F. Wu, J. Nanavati, M. Harman, Y. Jia, and J. Krinke, "Memory Mutation Testing," Information and Software Technology, Vol.81, pp.97-111, 2017. https://doi.org/10.1016/j.infsof.2016.03.002
- Hossain Shahriar and Mohammad Zulkernine, "Mutationbased Testing of Buffer Overflow Vulnerabilities, Computer Software and Applications," (COMSAC'08) 32nd Annual IEEE International, pp.979-984. 2008.
- Markus Kusano and Chao Wang, "CCmutator: A Mutation Generator for Concurrency Constructs in Multithreaded C/C++ Applications," in Proceeding of the 28th IEEE/ACM International Conference on Automated Software Engineering, pp.722-725, 2013.
- Alper Sen, "Mutation Operators for Concurrent SystemC Designs," in Microprocessor Test and Verification (MTV), 10th International Workshop on, pp.27-31, Dec. 2009.
- Sunwoo Kim, John A. Clark, and John A. Mcdermid, "Class Mutation: Mutation Testing for Object-oriented Programs," In Proc. Net. ObjectDays. Erfurt, Germany: Net. Objects, pp.9-12, 2000.