Sciweavers

21 search results - page 4 / 5
» Null dereference analysis in practice
Sort
View
COMPSAC
1999
IEEE
15 years 1 months ago
Detecting Null Pointer Violations in Java Programs
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiri...
PIMRC
2010
IEEE
14 years 7 months ago
Vandermonde-subspace frequency division multiplexing receiver analysis
Abstract--Vandermonde-subspace frequency division multiplexing (VFDM) is a technique for interference cancellation in overlay networks that allows a secondary network to operate si...
Leonardo S. Cardoso, Francisco Rodrigo P. Cavalcan...
PLDI
2000
ACM
15 years 1 months ago
Off-line variable substitution for scaling points-to analysis
Most compiler optimizations and software productivity tools rely on information about the effects of pointer dereferences in a program. The purpose of points-to analysis is to com...
Atanas Rountev, Satish Chandra
SIGSOFT
2003
ACM
15 years 10 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
POPL
2012
ACM
13 years 5 months ago
A type system for borrowing permissions
In object-oriented programming, unique permissions to object references are useful for checking correctness properties such as consistency of typestate and noninterference of conc...
Karl Naden, Robert Bocchino, Jonathan Aldrich, Kev...