A survey of automated techniques for formal software verification
The quality and the correctness of software are often the greatest concern in electronic
systems. Formal verification tools can provide a guarantee that a design is free of specific …
systems. Formal verification tools can provide a guarantee that a design is free of specific …
A brief survey of program slicing
B Xu, J Qian, X Zhang, Z Wu, L Chen - ACM SIGSOFT Software …, 2005 - dl.acm.org
Program slicing is a technique to extract program parts with respect to some special
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …
Control jujutsu: On the weaknesses of fine-grained control flow integrity
Control flow integrity (CFI) has been proposed as an approach to defend against control-
hijacking memory corruption attacks. CFI works by assigning tags to indirect branch targets …
hijacking memory corruption attacks. CFI works by assigning tags to indirect branch targets …
Pointer analysis: Haven't we solved this problem yet?
M Hind - Proceedings of the 2001 ACM SIGPLAN-SIGSOFT …, 2001 - dl.acm.org
During the past twenty-one years, over seventy-five papers and nine Ph. D. theses have
been published on pointer analysis. Given the tomes of work on this topic one may …
been published on pointer analysis. Given the tomes of work on this topic one may …
Karonte: Detecting insecure multi-binary interactions in embedded firmware
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …
[图书][B] Data flow analysis: theory and practice
U Khedker, A Sanyal, B Sathe - 2017 - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …
ranging from compiler optimizations to software engineering and verification. Modern …
Escape analysis for Java
This paper presents a simple and efficient data flow algorithm for escape analysis of objects
in Java programs to determine (i) if an object can be allocated on the stack;(ii) if an object is …
in Java programs to determine (i) if an object can be allocated on the stack;(ii) if an object is …
Flow-sensitive pointer analysis for millions of lines of code
B Hardekopf, C Lin - International Symposium on Code …, 2011 - ieeexplore.ieee.org
Many program analyses benefit, both in precision and performance, from precise pointer
analysis. An important dimension of pointer analysis precision is flow-sensitivity, which has …
analysis. An important dimension of pointer analysis precision is flow-sensitivity, which has …
The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code
B Hardekopf, C Lin - Proceedings of the 28th ACM SIGPLAN …, 2007 - dl.acm.org
Pointer information is a prerequisite for most program analyses, and the quality of this
information can greatly affect their precision and performance. Inclusion-based (ie Andersen …
information can greatly affect their precision and performance. Inclusion-based (ie Andersen …