The problem addressed in this paper is sound, scalable, demand-driven null-dereference verification for Java programs. Our approach consists conceptually of a base analysis, plus two major extensions for enhanced precision. The base analysis is a dataflow analysis wherein we propagate formulas in the backward direction from a given dereference, and compute a necessary condition at the en-try of the program for the dereference to be potentially unsafe. The extensions are motivated by the presence of certain “difficult ” constructs in real programs, e.g., virtual calls with too many candidate targets, and library method calls, which happen to need excessive analysis time to be analyzed fully. The base analysis is hence configured to skip such...
This paper proposes a practical static analysis tool named LUKE, for detecting null pointer derefere...
I present an implementation of a new method purity analysis for Java programs, which is described in...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
The problem addressed in this paper is sound, scalable, demand-driven null-dereference verification ...
The problem addressed in this paper is sound, scalable, demand-driven null-dereference verification ...
The problem addressed in this thesis is sound, scalable, demand-driven null-dereference verification ...
Null dereferences are a bane of programming in languages such as Java. In this paper we propose a so...
Null dereferences are a bane of programming in languages such as Java. In this paper we propose a so...
Null pointer dereferences in Java raise exceptions, occur often, are hard to debug and cost a lot of...
This paper addresses the challenging problem of verifying the safety of pointer dereferences in real...
Null dereferencing is one of the most frequent bugs in Java systems causing programs to crash due to...
This experimental paper describes the implementation and evaluation of a static nullness analyser fo...
Attempts to dereference nil result in anexception or a segmentation fault. Hence itis importantto kn...
In Java, C or C++, attempts to dereference the nil value result in anexception or a segmentation fau...
we envision a world where no exceptions are are total functions. Either an operation executes normal...
This paper proposes a practical static analysis tool named LUKE, for detecting null pointer derefere...
I present an implementation of a new method purity analysis for Java programs, which is described in...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
The problem addressed in this paper is sound, scalable, demand-driven null-dereference verification ...
The problem addressed in this paper is sound, scalable, demand-driven null-dereference verification ...
The problem addressed in this thesis is sound, scalable, demand-driven null-dereference verification ...
Null dereferences are a bane of programming in languages such as Java. In this paper we propose a so...
Null dereferences are a bane of programming in languages such as Java. In this paper we propose a so...
Null pointer dereferences in Java raise exceptions, occur often, are hard to debug and cost a lot of...
This paper addresses the challenging problem of verifying the safety of pointer dereferences in real...
Null dereferencing is one of the most frequent bugs in Java systems causing programs to crash due to...
This experimental paper describes the implementation and evaluation of a static nullness analyser fo...
Attempts to dereference nil result in anexception or a segmentation fault. Hence itis importantto kn...
In Java, C or C++, attempts to dereference the nil value result in anexception or a segmentation fau...
we envision a world where no exceptions are are total functions. Either an operation executes normal...
This paper proposes a practical static analysis tool named LUKE, for detecting null pointer derefere...
I present an implementation of a new method purity analysis for Java programs, which is described in...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...