Research Article
Infeasible Path Detection Based on Code Pattern and Backward Symbolic Execution
Table 4
Comparison between forward analysis and reverse analysis.
| Test code | LOC | Success | Time (ms) | Total paths explored | Pex | Forward | Backward | Forward | Backward | Forward | Backward | Success |
| Foo | 11 | No | Yes | Timeout | 729.62 | ā | 273 | No | pel | 21 | Yes | Yes | 892.23 | 96.41 | 123 | 29 | Yes | do_decode | 43 | Yes | Yes | 263.12 | 173.07 | 89 | 71 | Yes | wanshu | 22 | Yes | Yes | 14.5 | 16.1 | 21 | 40 | Yes | fenyu | 17 | No | Yes | Timeout | 54.3 | ā | 39 | No |
|
|