Parallelized sequential composition and hardware weak memory models

RJ Colvin - International Conference on Software Engineering and …, 2021 - Springer
Since the 1960s processors have, for efficiency, sometimes executed instructions out of
program order, provided that the (sequential) semantics is preserved. On uniprocessor …

[PDF][PDF] Towards a compiler for business processes-a research agenda

TM Prinz, TS Heinze, W Amme, J Kretzschmar… - Service …, 2015 - researchgate.net
Business process management (BPM) and serviceoriented architectures (SOA) promise the
development, application, maintenance, and improvement of business processes, ie, service …

A binary decision tree abstract domain functor

J Chen, P Cousot - Static Analysis: 22nd International Symposium, SAS …, 2015 - Springer
We present an abstract domain functor whose elements are binary decision trees. It is
parameterized by decision nodes which are a set of boolean tests appearing in the …

Data-flow bending: On the effectiveness of data-flow integrity

T Lu, J Wang - Computers & Security, 2019 - Elsevier
Most software attacks subvert the intended data-flow of a program via exploiting the memory
corruption vulnerabilities. Data-Flow Integrity (DFI) is a generic defense against such …

Programs from proofs: A framework for the safe execution of untrusted software

MC Jakobs, H Wehrheim - ACM Transactions on Programming …, 2017 - dl.acm.org
Today, software is traded worldwide on global markets, with apps being downloaded to
smartphones within minutes or seconds. This poses, more than ever, the challenge of …

Separation of concerning things: a simpler basis for defining and programming with the C/C++ memory model (extended version)

RJ Colvin - arXiv preprint arXiv:2204.03189, 2022 - arxiv.org
The C/C++ memory model provides an interface and execution model for programmers of
concurrent (shared-variable) code. It provides a range of mechanisms that abstract from …

Sparse analysis of variable path predicates based upon SSA-form

TS Heinze, W Amme - … Applications of Formal Methods, Verification and …, 2016 - Springer
Abstract Static Single Assignment Form benefits data flow analysis by its static guarantees
on the definitions and uses of variables. In this paper, we show how to exploit these …

VICO: demand-driven verification for improving compiler optimizations

S Khan, B Chatterjee, S Pande - Proceedings of the 36th ACM …, 2022 - dl.acm.org
In spite of tremendous advances in data dependence and dataflow analysis techniques,
state-of-the-art optimizing compilers continue to suffer from imprecisions and miss potential …

[PDF][PDF] Dynamic Symbolic Execution with Descriptive and Prescriptive Relations.

E Alatawi - 2019 - minerva-access.unimelb.edu.au
Static analysis and systematic software testing are two fundamental techniques that aim to
ensure software quality. Recently, there has been an obvious interest in exploiting the …

Implementation and Evaluation of a Static Backwards Data Flow Analysis in FlowDroid

T Lange - tuprints.ulb.tu-darmstadt.de
In the last decade, many static taint analysis tools based on IFDS have been proposed.
Nearly all of them only have a single analysis direction, with most opting for a forward …