Field-sensitive static analyses of object-oriented code use approximations of the computational states where fields are taken into account, for better precision. This article presents a novel and sound definite analysis of Java bytecode that states two strictly related properties: field-sensitive unreachability between program vari-ables and field-sensitive non-cyclicity of program variables. The latter exploits the former for better precision. We build a data-flow analysis based on constraint graphs, whose nodes are program points and whose arcs propagate information according to the semantics of each bytecode instruction. We follow abstract interpreta-tion both to approximate the concrete semantics and to prove our results formally correc...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
Abstract. Termination analysis has received considerable attention, tra-ditionally in the context of...
Abstract. Concurrent programs that are free of unsynchronized ac-cesses to shared data may still exh...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
A variable v reaches a variable w if there is a path from the memory location bound to v to the one ...
Abstract. Shared and mutable data-structures pose major problems in static analysis and most analyze...
AbstractAbstract interpretation has been widely used for the analysis of object-oriented languages a...
Static analysis which takes into account the value of data stored in the heap is typically considere...
Static analysis which takes into account the values of data stored in the heap is considered complex...
Non-termination analysis proves that programs, or parts of a program, do not terminate. This is impo...
AbstractNon-termination analysis proves that programs, or parts of a program, do not terminate. This...
Abstract interpretation has been widely used for the analysis of object-oriented languages and, more...
Abstract — In classic information flow control (IFC), noninterference guarantees that no information...
In programming languages with dynamic use of memory, such as Java, knowing that a reference variable...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
Abstract. Termination analysis has received considerable attention, tra-ditionally in the context of...
Abstract. Concurrent programs that are free of unsynchronized ac-cesses to shared data may still exh...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
A variable v reaches a variable w if there is a path from the memory location bound to v to the one ...
Abstract. Shared and mutable data-structures pose major problems in static analysis and most analyze...
AbstractAbstract interpretation has been widely used for the analysis of object-oriented languages a...
Static analysis which takes into account the value of data stored in the heap is typically considere...
Static analysis which takes into account the values of data stored in the heap is considered complex...
Non-termination analysis proves that programs, or parts of a program, do not terminate. This is impo...
AbstractNon-termination analysis proves that programs, or parts of a program, do not terminate. This...
Abstract interpretation has been widely used for the analysis of object-oriented languages and, more...
Abstract — In classic information flow control (IFC), noninterference guarantees that no information...
In programming languages with dynamic use of memory, such as Java, knowing that a reference variable...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
We present an algorithm for extracting control flow graphs from Java bytecode that captures normal a...
Abstract. Termination analysis has received considerable attention, tra-ditionally in the context of...
Abstract. Concurrent programs that are free of unsynchronized ac-cesses to shared data may still exh...