SVF: interprocedural static value-flow analysis in LLVM

Y Sui, J Xue - Proceedings of the 25th international conference on …, 2016 - dl.acm.org
This paper presents SVF, a tool that enables scalable and precise interprocedural Static
Value-Flow analysis for C programs by leveraging recent advances in sparse analysis. SVF …

Debloating software through {Piece-Wise} compilation and loading

A Quach, A Prakash, L Yan - 27th USENIX security symposium (USENIX …, 2018 - usenix.org
Programs are bloated. Our study shows that only 5% of libc is used on average across the
Ubuntu Desktop envi-ronment (2016 programs); the heaviest user, vlc media player, only …

A survey of parametric static analysis

J Park, H Lee, S Ryu - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Understanding program behaviors is important to verify program properties or to optimize
programs. Static analysis is a widely used technique to approximate program behaviors via …

Static memory leak detection using full-sparse value-flow analysis

Y Sui, D Ye, J Xue - Proceedings of the 2012 International Symposium …, 2012 - dl.acm.org
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging
recent advances on sparse pointer analysis, Saber is the first to use a full-sparse value-flow …

Detecting memory leaks statically with full-sparse value-flow analysis

Y Sui, D Ye, J Xue - IEEE Transactions on Software …, 2014 - ieeexplore.ieee.org
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging
recent advances on sparse pointer analysis, Saber is the first to use a full-sparse value-flow …

A cocktail approach to practical call graph construction

Y Cai, C Zhang - Proceedings of the ACM on Programming Languages, 2023 - dl.acm.org
After decades of research, constructing call graphs for modern C-based software remains
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …

Spatio-temporal context reduction: A pointer-analysis-based static approach for detecting use-after-free vulnerabilities

H Yan, Y Sui, S Chen, J Xue - … of the 40th International Conference on …, 2018 - dl.acm.org
Zero-day Use-After-Free (UAF) vulnerabilities are increasingly popular and highly
dangerous, but few mitigations exist. We introduce a new pointer-analysis-based static …

Efficient and precise points-to analysis: modeling the heap by merging equivalent automata

T Tan, Y Li, J Xue - Proceedings of the 38th ACM SIGPLAN Conference …, 2017 - dl.acm.org
Mainstream points-to analysis techniques for object-oriented languages rely predominantly
on the allocation-site abstraction to model heap objects. We present MAHJONG, a novel …

On-demand strong update analysis via value-flow refinement

Y Sui, J Xue - Proceedings of the 2016 24th ACM SIGSOFT …, 2016 - dl.acm.org
We present a new Strong UPdate Analysis for C programs, called Supa, that enables
computing points-to information on-demand via value-flow refinement, in environments with …

Boosting the performance of flow-sensitive points-to analysis using value flow

L Li, C Cifuentes, N Keynes - Proceedings of the 19th ACM SIGSOFT …, 2011 - dl.acm.org
Points-to analysis is a fundamental static analysis technique which computes the set of
memory objects that a pointer may point to. Many different applications, such as security …