What developers want and need from program analysis: an empirical study

M Christakis, C Bird - Proceedings of the 31st IEEE/ACM international …, 2016 - dl.acm.org
Program Analysis has been a rich and fruitful field of research for many decades, and
countless high quality program analysis tools have been produced by academia. Though …

Survey of approaches for postprocessing of static analysis alarms

T Muske, A Serebrenik - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Static analysis tools have showcased their importance and usefulness in automated
detection of defects. However, the tools are known to generate a large number of alarms …

Code2inv: A deep learning framework for program verification

X Si, A Naik, H Dai, M Naik, L Song - … , CAV 2020, Los Angeles, CA, USA …, 2020 - Springer
We propose a general end-to-end deep learning framework Code2Inv, which takes a
verification task and a proof checker as input, and automatically learns a valid proof for the …

Relational cost analysis

E Çiçek, G Barthe, M Gaboardi, D Garg… - ACM SIGPLAN …, 2017 - dl.acm.org
Establishing quantitative bounds on the execution cost of programs is essential in many
areas of computer science such as complexity analysis, compiler optimizations, security and …

Survey of approaches for handling static analysis alarms

T Muske, A Serebrenik - 2016 IEEE 16th International Working …, 2016 - ieeexplore.ieee.org
Static analysis tools have showcased their importance and usefulness in automated
detection of code anomalies and defects. However, the large number of alarms reported and …

Static race detection for device drivers: the Goblint approach

V Vojdani, K Apinis, V Rõtov, H Seidl, V Vene… - Proceedings of the 31st …, 2016 - dl.acm.org
Device drivers rely on fine-grained locking to ensure safe access to shared data structures.
For human testers, concurrency makes such code notoriously hard to debug; for automated …

Verified three-way program merge

M Sousa, I Dillig, SK Lahiri - Proceedings of the ACM on Programming …, 2018 - dl.acm.org
Even though many programmers rely on 3-way merge tools to integrate changes from
different branches, such tools can introduce subtle bugs in the integration process. This …

Finding fixed vulnerabilities with off-the-shelf static analysis

T Dunlap, S Thorn, W Enck… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Software depends on upstream projects that regularly fix vulnerabilities, but the
documentation of those vulnerabilities is often unreliable or unavailable. Automating the …

[HTML][HTML] Product programs and relational program logics

G Barthe, JM Crespo, C Kunz - Journal of Logical and Algebraic Methods in …, 2016 - Elsevier
A common theme in program verification is to relate two programs, for instance to show that
they are equivalent, or that one refines the other. Such relationships can be formally …

Boosting complete-code tool for partial program

H Zhong, X Wang - 2017 32nd IEEE/ACM International …, 2017 - ieeexplore.ieee.org
To improve software quality, researchers and practitioners have proposed static analysis
tools for various purposes (eg, detecting bugs, anomalies, and vulnerabilities). Although …