Supporting the debugging of Erlang programs by symbolic execution

Programmers can benefit from static source code analysis techniques in various ways: they can understand their code better, test it more effectively, debug it more efficiently, and so on. However, they often face the challenge of discovering how to reproduce faulty executions that cause runtime er...

Full description

Saved in:
Bibliographic Details
Main Authors: Zsófia Erdei, Melinda Tóth, István Bozó
Format: Article
Language:English
Published: Scientia Publishing House 2024-10-01
Series:Acta Universitatis Sapientiae: Informatica
Subjects:
Online Access:https://acta.sapientia.ro/content/docs/info16-1-04-721457.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Programmers can benefit from static source code analysis techniques in various ways: they can understand their code better, test it more effectively, debug it more efficiently, and so on. However, they often face the challenge of discovering how to reproduce faulty executions that cause runtime errors. The term symbolic execution refers to a static source code analysis method that can help with this challenge. In this paper, we are showing a symbolic execution-based analysis method to find the source of a runtime error. The method uses a control-flow graph to select the execution paths reaching the targeted runtime error. The algorithm is implemented as part of the RefactorErl static program analysis and transformation framework.
ISSN:2066-7760