Abstract. Detection of infeasible code has recently been identified as a scalable and automated technique to locate likely defects in software programs. Given the (acyclic) control-flow graph of a procedure, infea-sible code detection depends on an exhaustive search for feasible paths through the graph. A number of encodings of control-flow graphs into logic (understood by theorem provers) have been proposed in the past for this application. In this paper, we compare the performance of these different encodings in terms of runtime and the number of queries pro-cessed by the prover. We present a theory of acyclic control-flow as an alternative method of handling control-flow graphs. Such a theory can be built into theorem provers by means of...
Analyzing the program conditional control flow the important technique using in program execution. S...
A workflow graph is a classical flow graph extended by concurrent fork and join. Workflow graphs can...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating...
This paper presents a graph-based formulation of control-flow analysis using results from game seman...
Abstract. This paper presents a graph-based formulation of controlflow analysis using results from g...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, includ...
The control flow of programs can be represented by directed graphs. In this paper we provide a unifo...
Properties of distributed computations can be either on their global states or on their control flow...
The correctness of a sequential program can be shown by the anno-tation of its control flow graph wi...
Of all software development activities, debugging---locating the defective source code statements th...
A review of published measures of control flow complexity in programs reveals three major deficienci...
International audienceThis study proposes a malware detection strategy based on control flow. It con...
In this paper, we propose a software vulnerability checker which takes rules describing vulnerabilit...
Analyzing the program conditional control flow the important technique using in program execution. S...
A workflow graph is a classical flow graph extended by concurrent fork and join. Workflow graphs can...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating...
This paper presents a graph-based formulation of control-flow analysis using results from game seman...
Abstract. This paper presents a graph-based formulation of controlflow analysis using results from g...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, includ...
The control flow of programs can be represented by directed graphs. In this paper we provide a unifo...
Properties of distributed computations can be either on their global states or on their control flow...
The correctness of a sequential program can be shown by the anno-tation of its control flow graph wi...
Of all software development activities, debugging---locating the defective source code statements th...
A review of published measures of control flow complexity in programs reveals three major deficienci...
International audienceThis study proposes a malware detection strategy based on control flow. It con...
In this paper, we propose a software vulnerability checker which takes rules describing vulnerabilit...
Analyzing the program conditional control flow the important technique using in program execution. S...
A workflow graph is a classical flow graph extended by concurrent fork and join. Workflow graphs can...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...