Dynamic Program Analysis Task
(Redirected from Dynamic Program Analysis)
Jump to navigation
Jump to search
A Dynamic Program Analysis Task is a Program Analysis (Computer Science) that ...
- See: Dynamic Testing, Program Analysis (Computer Science), Static Program Analysis, Behavioral Software Analysis, Unit Testing, Debugging, Code Coverage.
References
2023
- (Wikipedia, 2023) ⇒ https://en.wikipedia.org/wiki/Dynamic_program_analysis Retrieved:2023-4-7.
- Dynamic program analysis is analysis of computer software that involves executing the program in question (as opposed to static program analysis, which does not). Dynamic program analysis includes familiar techniques from software engineering such as unit testing, debugging, and measuring code coverage, but also includes lesser-known techniques like program slicing and invariant inference. Dynamic program analysis is widely applied in security in the form of runtime memory error detection, fuzzing, dynamic symbolic execution, and taint tracking.
For dynamic program analysis to be effective, the target program must be executed with sufficient test inputs to cover almost all possible outputs. Use of software testing measures such as code coverage helps increase the chance that an adequate slice of the program's set of possible behaviors has been observed.Also, care must be taken to minimize the effect that instrumentation has on the execution (including temporal properties) of the target program. Dynamic analysis is in contrast to static program analysis. Unit tests, integration tests, system tests and acceptance tests use dynamic testing.
- Dynamic program analysis is analysis of computer software that involves executing the program in question (as opposed to static program analysis, which does not). Dynamic program analysis includes familiar techniques from software engineering such as unit testing, debugging, and measuring code coverage, but also includes lesser-known techniques like program slicing and invariant inference. Dynamic program analysis is widely applied in security in the form of runtime memory error detection, fuzzing, dynamic symbolic execution, and taint tracking.