{"title":"动态测试COM组件内存异常的方法","authors":"Binbin Qu, Jufang Shu, Xiaodong Xie, Yansheng Lu","doi":"10.1109/WCSE.2009.261","DOIUrl":null,"url":null,"abstract":"With the rapid development in the field of components based software engineering, there is a need for security testing of third-party components. Components possess characteristics such as strict encapsulation and binary code reuse, making components testing more difficult than traditional testing. In this paper, we introduce a new testing system based on dot net for dynamic monitoring COM components’ memory abnormity by debugging technique, metadata extraction technology and windows message mechanisms. The system can perform metadata extracting algorithm from components which are described by XML documents. Meanwhile, the approach of obtaining components parameters is discussed. The empirical results demonstrate that the system can effectively monitor and capture memory abnormity during run-time.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Approach of Dynamically Test COM Components Memory Abnormity\",\"authors\":\"Binbin Qu, Jufang Shu, Xiaodong Xie, Yansheng Lu\",\"doi\":\"10.1109/WCSE.2009.261\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development in the field of components based software engineering, there is a need for security testing of third-party components. Components possess characteristics such as strict encapsulation and binary code reuse, making components testing more difficult than traditional testing. In this paper, we introduce a new testing system based on dot net for dynamic monitoring COM components’ memory abnormity by debugging technique, metadata extraction technology and windows message mechanisms. The system can perform metadata extracting algorithm from components which are described by XML documents. Meanwhile, the approach of obtaining components parameters is discussed. The empirical results demonstrate that the system can effectively monitor and capture memory abnormity during run-time.\",\"PeriodicalId\":331155,\"journal\":{\"name\":\"2009 WRI World Congress on Software Engineering\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 WRI World Congress on Software Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCSE.2009.261\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 WRI World Congress on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSE.2009.261","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Approach of Dynamically Test COM Components Memory Abnormity
With the rapid development in the field of components based software engineering, there is a need for security testing of third-party components. Components possess characteristics such as strict encapsulation and binary code reuse, making components testing more difficult than traditional testing. In this paper, we introduce a new testing system based on dot net for dynamic monitoring COM components’ memory abnormity by debugging technique, metadata extraction technology and windows message mechanisms. The system can perform metadata extracting algorithm from components which are described by XML documents. Meanwhile, the approach of obtaining components parameters is discussed. The empirical results demonstrate that the system can effectively monitor and capture memory abnormity during run-time.