Sciweavers

1687 search results - page 2 / 338
» Which pointer analysis should I use
Sort
View
CGO
2005
IEEE
13 years 10 months ago
Practical and Accurate Low-Level Pointer Analysis
Pointer analysis is traditionally performed once, early in the compilation process, upon an intermediate representation (IR) with source-code semantics. However, performing pointe...
Bolei Guo, Matthew J. Bridges, Spyridon Triantafyl...
COMPSAC
1999
IEEE
13 years 9 months ago
Detecting Null Pointer Violations in Java Programs
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiri...
CGO
2011
IEEE
12 years 9 months ago
Flow-sensitive pointer analysis for millions of lines of code
—Many program analyses benefit, both in precision and performance, from precise pointer analysis. An important dimension of pointer analysis precision is flow-sensitivity, whic...
Ben Hardekopf, Calvin Lin
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
13 years 4 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
PLDI
1999
ACM
13 years 9 months ago
Pointer Analysis for Multithreaded Programs
This paper presents a novel interprocedural, ow-sensitive, and context-sensitive pointer analysis algorithm for multithreaded programs that may concurrently update shared pointers...
Radu Rugina, Martin C. Rinard