Parallelized sequential composition and hardware weak memory models
RJ Colvin - International Conference on Software Engineering and …, 2021 - Springer
Since the 1960s processors have, for efficiency, sometimes executed instructions out of
program order, provided that the (sequential) semantics is preserved. On uniprocessor …
program order, provided that the (sequential) semantics is preserved. On uniprocessor …
[PDF][PDF] Towards a compiler for business processes-a research agenda
Business process management (BPM) and serviceoriented architectures (SOA) promise the
development, application, maintenance, and improvement of business processes, ie, service …
development, application, maintenance, and improvement of business processes, ie, service …
A binary decision tree abstract domain functor
J Chen, P Cousot - Static Analysis: 22nd International Symposium, SAS …, 2015 - Springer
We present an abstract domain functor whose elements are binary decision trees. It is
parameterized by decision nodes which are a set of boolean tests appearing in the …
parameterized by decision nodes which are a set of boolean tests appearing in the …
Data-flow bending: On the effectiveness of data-flow integrity
T Lu, J Wang - Computers & Security, 2019 - Elsevier
Most software attacks subvert the intended data-flow of a program via exploiting the memory
corruption vulnerabilities. Data-Flow Integrity (DFI) is a generic defense against such …
corruption vulnerabilities. Data-Flow Integrity (DFI) is a generic defense against such …
Programs from proofs: A framework for the safe execution of untrusted software
MC Jakobs, H Wehrheim - ACM Transactions on Programming …, 2017 - dl.acm.org
Today, software is traded worldwide on global markets, with apps being downloaded to
smartphones within minutes or seconds. This poses, more than ever, the challenge of …
smartphones within minutes or seconds. This poses, more than ever, the challenge of …
Separation of concerning things: a simpler basis for defining and programming with the C/C++ memory model (extended version)
RJ Colvin - arXiv preprint arXiv:2204.03189, 2022 - arxiv.org
The C/C++ memory model provides an interface and execution model for programmers of
concurrent (shared-variable) code. It provides a range of mechanisms that abstract from …
concurrent (shared-variable) code. It provides a range of mechanisms that abstract from …
Sparse analysis of variable path predicates based upon SSA-form
TS Heinze, W Amme - … Applications of Formal Methods, Verification and …, 2016 - Springer
Abstract Static Single Assignment Form benefits data flow analysis by its static guarantees
on the definitions and uses of variables. In this paper, we show how to exploit these …
on the definitions and uses of variables. In this paper, we show how to exploit these …
VICO: demand-driven verification for improving compiler optimizations
In spite of tremendous advances in data dependence and dataflow analysis techniques,
state-of-the-art optimizing compilers continue to suffer from imprecisions and miss potential …
state-of-the-art optimizing compilers continue to suffer from imprecisions and miss potential …
[PDF][PDF] Dynamic Symbolic Execution with Descriptive and Prescriptive Relations.
E Alatawi - 2019 - minerva-access.unimelb.edu.au
Static analysis and systematic software testing are two fundamental techniques that aim to
ensure software quality. Recently, there has been an obvious interest in exploiting the …
ensure software quality. Recently, there has been an obvious interest in exploiting the …
Implementation and Evaluation of a Static Backwards Data Flow Analysis in FlowDroid
T Lange - tuprints.ulb.tu-darmstadt.de
In the last decade, many static taint analysis tools based on IFDS have been proposed.
Nearly all of them only have a single analysis direction, with most opting for a forward …
Nearly all of them only have a single analysis direction, with most opting for a forward …