A survey of automated techniques for formal software verification

V D'silva, D Kroening… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The quality and the correctness of software are often the greatest concern in electronic
systems. Formal verification tools can provide a guarantee that a design is free of specific …

A brief survey of program slicing

B Xu, J Qian, X Zhang, Z Wu, L Chen - ACM SIGSOFT Software …, 2005 - dl.acm.org
Program slicing is a technique to extract program parts with respect to some special
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …

Control jujutsu: On the weaknesses of fine-grained control flow integrity

I Evans, F Long, U Otgonbaatar, H Shrobe… - Proceedings of the …, 2015 - dl.acm.org
Control flow integrity (CFI) has been proposed as an approach to defend against control-
hijacking memory corruption attacks. CFI works by assigning tags to indirect branch targets …

[图书][B] Engineering a compiler

KD Cooper, L Torczon - 2022 - books.google.com
Engineering a Compiler, Third Edition covers the latest developments in compiler
technology, with new chapters focusing on semantic elaboration (the problems that arise in …

Pointer analysis: Haven't we solved this problem yet?

M Hind - Proceedings of the 2001 ACM SIGPLAN-SIGSOFT …, 2001 - dl.acm.org
During the past twenty-one years, over seventy-five papers and nine Ph. D. theses have
been published on pointer analysis. Given the tomes of work on this topic one may …

Karonte: Detecting insecure multi-binary interactions in embedded firmware

N Redini, A Machiry, R Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …

[图书][B] Data flow analysis: theory and practice

U Khedker, A Sanyal, B Sathe - 2017 - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …

Escape analysis for Java

JD Choi, M Gupta, M Serrano, VC Sreedhar… - Acm Sigplan …, 1999 - dl.acm.org
This paper presents a simple and efficient data flow algorithm for escape analysis of objects
in Java programs to determine (i) if an object can be allocated on the stack;(ii) if an object is …

Flow-sensitive pointer analysis for millions of lines of code

B Hardekopf, C Lin - International Symposium on Code …, 2011 - ieeexplore.ieee.org
Many program analyses benefit, both in precision and performance, from precise pointer
analysis. An important dimension of pointer analysis precision is flow-sensitivity, which has …

The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code

B Hardekopf, C Lin - Proceedings of the 28th ACM SIGPLAN …, 2007 - dl.acm.org
Pointer information is a prerequisite for most program analyses, and the quality of this
information can greatly affect their precision and performance. Inclusion-based (ie Andersen …