Control-flow integrity: Precision, security, and performance

N Burow, SA Carr, J Nash, P Larsen, M Franz… - ACM Computing …, 2017‏ - dl.acm.org
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …

A brief survey of program slicing

B Xu, J Qian, X Zhang, Z Wu, L Chen - ACM SIGSOFT Software …, 2005‏ - dl.acm.org
Program slicing is a technique to extract program parts with respect to some special
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …

Sequoia: Enabling quality-of-service in serverless computing

A Tariq, A Pahl, S Nimmagadda, E Rozner… - Proceedings of the 11th …, 2020‏ - dl.acm.org
Serverless computing is a rapidly growing paradigm that easily harnesses the power of the
cloud. With serverless computing, developers simply provide an event-driven function to …

Parameterized object sensitivity for points-to analysis for Java

A Milanova, A Rountev, BG Ryder - ACM Transactions on Software …, 2005‏ - dl.acm.org
The goal of points-to analysis for Java is to determine the set of objects pointed to by a
reference variable or a reference object field. We present object sensitivity, a new form of …

Perracotta: mining temporal API rules from imperfect traces

J Yang, D Evans, D Bhardwaj, T Bhat… - Proceedings of the 28th …, 2006‏ - dl.acm.org
Dynamic inference techniques have been demonstrated to provide useful support for
various software engineering tasks including bug finding, test suite evaluation and …

[کتاب][B] Data flow analysis: theory and practice

U Khedker, A Sanyal, B Sathe - 2017‏ - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …

Static control-flow analysis of user-driven callbacks in Android applications

S Yang, D Yan, H Wu, Y Wang… - 2015 IEEE/ACM 37th …, 2015‏ - ieeexplore.ieee.org
Android software presents many challenges for static program analysis. In this work we
focus on the fundamental problem of static control-flow analysis. Traditional analyses cannot …

Refinement-based context-sensitive points-to analysis for Java

M Sridharan, R Bodík - ACM SIGPLAN Notices, 2006‏ - dl.acm.org
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …

Boomerang: Demand-driven flow-and context-sensitive pointer analysis for java

J Späth, L Nguyen Quang Do, K Ali… - … Conference on Object …, 2016‏ - drops.dagstuhl.de
Many current program analyses require highly precise pointer information about small,
targeted parts of a given program. This motivates the need for demand-driven pointer …

An extensive study of static regression test selection in modern software evolution

O Legunsen, F Hariri, A Shi, Y Lu, L Zhang… - Proceedings of the …, 2016‏ - dl.acm.org
Regression test selection (RTS) aims to reduce regression testing time by only re-running
the tests affected by code changes. Prior research on RTS can be broadly split into dy namic …