You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, detectors explore paths recursively. For each execution path, the detector will check if the path satisfies a condition and does not report the execution path if it does satisfy the condition. The conditions are verified at the block level and the detector would not know whether to report a path or not until it reaches the end of it. This results in a large number of output files as each path is represented in a separate file.
Using the analysis described in #96, we can find the root block B which lacks the condition i.e All execution paths containing B will be vulnerable. This helps in representing multiple vulnerable paths in one output file and also helps developers in finding the code location to update i.e developers can just add the condition in block B.
The text was updated successfully, but these errors were encountered:
Currently, detectors explore paths recursively. For each execution path, the detector will check if the path satisfies a condition and does not report the execution path if it does satisfy the condition. The conditions are verified at the block level and the detector would not know whether to report a path or not until it reaches the end of it. This results in a large number of output files as each path is represented in a separate file.
Using the analysis described in #96, we can find the root block B which lacks the condition i.e All execution paths containing B will be vulnerable. This helps in representing multiple vulnerable paths in one output file and also helps developers in finding the code location to update i.e developers can just add the condition in block B.
The text was updated successfully, but these errors were encountered: