P/taint: Unified points-to and taint analysis
N Grech, Y Smaragdakis - Proceedings of the ACM on Programming …, 2017 - dl.acm.org
Static information-flow analysis (especially taint-analysis) is a key technique in software
security, computing where sensitive or untrusted data can propagate in a program. Points-to …
security, computing where sensitive or untrusted data can propagate in a program. Points-to …
Parrot: A practical runtime for deterministic, stable, and reliable threads
Multithreaded programs are hard to get right. A key reason is that the contract between
developers and runtimes grants exponentially many schedules to the runtimes. We present …
developers and runtimes grants exponentially many schedules to the runtimes. We present …
Concurrency attacks
Just as errors in sequential programs can lead to security exploits, errors in concurrent
programs can lead to concurrency attacks. Questions such as whether these attacks are …
programs can lead to concurrency attacks. Questions such as whether these attacks are …
Canary: practical static detection of inter-thread value-flow bugs
Concurrent programs are still prone to bugs arising from the subtle interleavings of threads.
Traditional static analysis for concurrent programs, such as data-flow analysis and symbolic …
Traditional static analysis for concurrent programs, such as data-flow analysis and symbolic …
{SKI}: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration
Kernel concurrency bugs are notoriously difficult to find during testing since they are only
triggered under certain instruction interleavings. Unfortunately, no tools for systematically …
triggered under certain instruction interleavings. Unfortunately, no tools for systematically …
On scheduling constraint abstraction for multi-threaded program verification
L Yin, W Dong, W Liu, J Wang - IEEE Transactions on Software …, 2018 - ieeexplore.ieee.org
Bounded model checking is among the most efficient techniques for the automated
verification of concurrent programs. However, due to the nondeterministic thread …
verification of concurrent programs. However, due to the nondeterministic thread …
Trace driven dynamic deadlock detection and reproduction
M Samak, MK Ramanathan - ACM SIGPLAN Notices, 2014 - dl.acm.org
Dynamic analysis techniques have been proposed to detect potential deadlocks. Analyzing
and comprehending each potential deadlock to determine whether the deadlock is feasible …
and comprehending each potential deadlock to determine whether the deadlock is feasible …
[HTML][HTML] Making parallel programs reliable with stable multithreading
Making parallel programs reliable with stable multithreading Page 1 58 communications of the
acm | march 2014 | vol. 57 | no. 3 contributed articles ill us tra tion b y Joel o rmsb y reliaBle …
acm | march 2014 | vol. 57 | no. 3 contributed articles ill us tra tion b y Joel o rmsb y reliaBle …
Runtime prevention of concurrency related type-state violations in multithreaded applications
We propose a new method for runtime prevention of type state violations in multithreaded
applications due to erroneous thread interleavings. The new method employs a combination …
applications due to erroneous thread interleavings. The new method employs a combination …
Input-covering schedules for multithreaded programs
T Bergan, L Ceze, D Grossman - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
We propose constraining multithreaded execution to small sets of input-covering schedules,
which we define as follows: given a program P, we say that a set of schedules∑ covers all …
which we define as follows: given a program P, we say that a set of schedules∑ covers all …