Control-flow integrity: Precision, security, and performance

N Burow, SA Carr, J Nash, P Larsen, M Franz… - ACM Computing …, 2017 - dl.acm.org
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …

A brief survey of program slicing

B Xu, J Qian, X Zhang, Z Wu, L Chen - ACM SIGSOFT Software …, 2005 - dl.acm.org
Program slicing is a technique to extract program parts with respect to some special
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …

Sequoia: Enabling quality-of-service in serverless computing

A Tariq, A Pahl, S Nimmagadda, E Rozner… - Proceedings of the 11th …, 2020 - dl.acm.org
Serverless computing is a rapidly growing paradigm that easily harnesses the power of the
cloud. With serverless computing, developers simply provide an event-driven function to …

Parameterized object sensitivity for points-to analysis for Java

A Milanova, A Rountev, BG Ryder - ACM Transactions on Software …, 2005 - dl.acm.org
The goal of points-to analysis for Java is to determine the set of objects pointed to by a
reference variable or a reference object field. We present object sensitivity, a new form of …

Perracotta: mining temporal API rules from imperfect traces

J Yang, D Evans, D Bhardwaj, T Bhat… - Proceedings of the 28th …, 2006 - dl.acm.org
Dynamic inference techniques have been demonstrated to provide useful support for
various software engineering tasks including bug finding, test suite evaluation and …

[图书][B] Data flow analysis: theory and practice

U Khedker, A Sanyal, B Sathe - 2017 - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …

Static control-flow analysis of user-driven callbacks in Android applications

S Yang, D Yan, H Wu, Y Wang… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Android software presents many challenges for static program analysis. In this work we
focus on the fundamental problem of static control-flow analysis. Traditional analyses cannot …

Refinement-based context-sensitive points-to analysis for Java

M Sridharan, R Bodík - ACM SIGPLAN Notices, 2006 - dl.acm.org
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …

Effective typestate verification in the presence of aliasing

SJ Fink, E Yahav, N Dor, G Ramalingam… - ACM Transactions on …, 2008 - dl.acm.org
This article addresses the challenge of sound typestate verification, with acceptable
precision, for real-world Java programs. We present a novel framework for verification of …

Boomerang: Demand-driven flow-and context-sensitive pointer analysis for java

J Späth, L Nguyen Quang Do, K Ali… - … Conference on Object …, 2016 - drops.dagstuhl.de
Many current program analyses require highly precise pointer information about small, tar-
geted parts of a given program. This motivates the need for demand-driven pointer analyses …