Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/se2p/sa2024
Jupyter Notebooks for the Software Analysis 2024 Course
https://github.com/se2p/sa2024
Last synced: 5 days ago
JSON representation
Jupyter Notebooks for the Software Analysis 2024 Course
- Host: GitHub
- URL: https://github.com/se2p/sa2024
- Owner: se2p
- Created: 2024-04-24T11:45:37.000Z (9 months ago)
- Default Branch: main
- Last Pushed: 2024-06-19T13:38:20.000Z (7 months ago)
- Last Synced: 2024-06-19T23:58:54.842Z (7 months ago)
- Language: Jupyter Notebook
- Size: 1.28 MB
- Stars: 1
- Watchers: 0
- Forks: 1
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Software Analysis SS2024
This repository collects examples from the Software Analysis lecture in
Jupyter notebooks.## Installation
PDF Exports of the notebooks will be uploaded to StudIP, and markdown
exports are included in the repository. To run the notebooks on your own you
will need to install [Jupyter](https://jupyter.org/install).## Contents
### 1: Initial character-based analysis
This chapter describes two very basic analyses of source code at character
level, by splitting source code files into lines: The first analysis is to
count lines of code, and the second on is a basic code clone detection
technique, capable of detecting type 1 clones.[Markdown Export](rendered/1%20Analysis%20Basics.md)
### 2: On the Naturalness of Code: Token-level analysis
This chapter looks at the process of converting source code into token streams,
and applying different types of analyses on these, such as code clone detection
or code completion based on language models.[Markdown Export](rendered/2%20Naturalness%20of%20Code.md)
### 3: Syntax-based analysis
This chapter considers syntactic information on top of the lexical
information provided by the tokens. That is, it considers what language
constructs the tokens are used in, by looking at the abstract syntax tree.
We further look at how we can automatically generate parsers using Antlr,
and then use these to translate programs and to create abstract syntax
trees. We also use the Abstract Syntax Trees to do some basic linting.[Markdown Export](rendered/3%20Syntax-based%20Analysis.md)
### 4: Control-flow analysis
This chapter looks at how to extract information about the flow of control
between the statements in a program, and how to represent this in the
control flow graph. The control flow graph is the foundation for further
control flow analyses, and in particular we consider dominance and
post-dominance relations, which in turn are the foundation for control
dependence analysis.[Markdown Export](rendered/4%20Controlflow_Analysis.md)
### 5: Data-flow analysis (Part 1)
This chapter looks at how to track the propagation of data throughout the
control flow of the program. We consider some classical data-flow analyses
using an iterative analysis framework, and specifically look at how to
propagate information about reaching definitions and reachable uses, which
then allows us to construct a data-dependence graph.[Markdown Export](rendered/5%20Dataflow%20Analysis.md)
### 6: Data-flow analysis (Part 2): Abstract interpretation
This chapter continues with dataflow analysis, and refines our iterative
dataflow analysis algorithm from chapter 6 to the lattice-theoretic monotone
framework. Using this framework, we can then apply abstract interpretation,
which is a more general analysis not only of how the program computes (which
are all the analyses from chapter 6), but also _what_ the program computes.
Since this is more challenging, we need to abstract the values. Our example
analysis checks if programs may have division by zero errors.[Markdown Export](rendered/6%20Abstract%20Interpretation.md)
### 7: Interprocedural analysis
This chapter continues the zero-analysis example, but considers what happens
if you have functions that call other functions. We can either assume a
function call can return anything, or we have to make our analysis
interprocedural. This causes some challenges, for example if the same
method is called from multiple locations. We counter this problem by making
our analysis context-sensitive (using cloning in the example).[Markdown Export](rendered/7%20Interprocedural%20Analysis.md)
### 8: Program Slicing
In this chapter we revisit control dependencies, and look at an alternative
way to calculate them using the dominance frontier (a concept used for
creating static single assignment form). By combining data and control
dependencies, we can create the program dependence graph. This can be used
to _slice_ programs, i.e., extract subsets of the program that are relevant
for a given target slicing criterion. Since the examples are analysing Java
code, the notebook focuses only on static slicing, although the concepts
generalise well to dynamic slicing as covered in the lecture.[Markdown Export](rendered/8%20Program%20Dependence.md)
### 9: Dynamic Analysis
All previous chapters considered static analysis, now we move on to dynamic
analysis. We start analysing Python code, since this can be executed easily
within the notebooks. We consider two alternative ways to instrument
programs such that we can create execution traces: (1) Modifying ASTs, and
(2) using the VM's tracing functionality. Using these instrumentation
approaches we implement a range of different example dynamic analyses.[Markdown Export](rendered/9%20Dynamic%20Analysis.md)
### 10: (Dynamic) Symbolic Execution
Symbolic execution represents execution paths as symbolic constraints over
input variables. This can be used to generate test inputs that cover
specific paths, or it can be used to check assertions and other properties
of a program. Although recent progress on constraint solvers (SMT solvers in
particular) has greatly improved the applicability of symbolic execution,
there are fundamental limitations such as having to deal with loops, or
black box function calls, which can, however, be overcome dynamically. The
combination of dynamic and symbolic execution is known as dynamic symbolic
execution, or concolic execution (concrete+symbolic). This chapter is based
on Andreas Zeller's excellent [Fuzzing Book](https://www.fuzzingbook.org/html/ConcolicFuzzer.html)[Markdown Export](rendered/10%20Symbolic%20Execution.md)