Control-flow integrity: Precision, security, and performance
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
A brief survey of program slicing
B Xu, J Qian, X Zhang, Z Wu, L Chen - ACM SIGSOFT Software …, 2005 - dl.acm.org
Program slicing is a technique to extract program parts with respect to some special
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …
Sequoia: Enabling quality-of-service in serverless computing
Serverless computing is a rapidly growing paradigm that easily harnesses the power of the
cloud. With serverless computing, developers simply provide an event-driven function to …
cloud. With serverless computing, developers simply provide an event-driven function to …
Parameterized object sensitivity for points-to analysis for Java
The goal of points-to analysis for Java is to determine the set of objects pointed to by a
reference variable or a reference object field. We present object sensitivity, a new form of …
reference variable or a reference object field. We present object sensitivity, a new form of …
Perracotta: mining temporal API rules from imperfect traces
J Yang, D Evans, D Bhardwaj, T Bhat… - Proceedings of the 28th …, 2006 - dl.acm.org
Dynamic inference techniques have been demonstrated to provide useful support for
various software engineering tasks including bug finding, test suite evaluation and …
various software engineering tasks including bug finding, test suite evaluation and …
[图书][B] Data flow analysis: theory and practice
U Khedker, A Sanyal, B Sathe - 2017 - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …
ranging from compiler optimizations to software engineering and verification. Modern …
Static control-flow analysis of user-driven callbacks in Android applications
Android software presents many challenges for static program analysis. In this work we
focus on the fundamental problem of static control-flow analysis. Traditional analyses cannot …
focus on the fundamental problem of static control-flow analysis. Traditional analyses cannot …
Refinement-based context-sensitive points-to analysis for Java
M Sridharan, R Bodík - ACM SIGPLAN Notices, 2006 - dl.acm.org
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …
Effective typestate verification in the presence of aliasing
This article addresses the challenge of sound typestate verification, with acceptable
precision, for real-world Java programs. We present a novel framework for verification of …
precision, for real-world Java programs. We present a novel framework for verification of …
Boomerang: Demand-driven flow-and context-sensitive pointer analysis for java
Many current program analyses require highly precise pointer information about small, tar-
geted parts of a given program. This motivates the need for demand-driven pointer analyses …
geted parts of a given program. This motivates the need for demand-driven pointer analyses …