Abstract interpretation has been widely used for the analysis of object-oriented languages and, more precisely, Java source and bytecode. However, while most of the existing work deals with the problem of finding expressive abstract domains that track accurately the characteristics of a particular concrete property, the underlying fixpoint algorithms have received comparatively less attention. In fact, many existing (abstract interpretation based) fixpoint algorithms rely on relatively inefficient techniques to solve inter-procedural call graphs or are specific and tied to particular analyses. We argue that the design of an efficient fixpoint algorithm is pivotal to support the analysis of large programs. In this paper we introduce a novel...
Developing scalable and precise points-to analyses is increasingly important for analysing and optim...
Big-step abstract interpreters are an approach to build static analyzers based on big-step interpret...
Java bytecode verification forms the basis for Java-based Internet security and needs a rigorous des...
Abstract interpretation has been widely used for the analysis of object-oriented languages and, more...
Abstract interpretation has been widely used for the analysis of object-oriented languages and, in p...
AbstractAbstract interpretation has been widely used for the analysis of object-oriented languages a...
Abstract interpreters rely on the existence of a nxpoint algorithm that calculates a least upper bou...
Accuracy, completeness, and performance are all major concerns in the context of dynamic program ana...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
Points-to analysis is a static analysis that approximates which memory locations each program expres...
Program analysis is critical to many software engineering tools. However, modern programming languag...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
The aim of incremental analysis is, given a program, its analysis results, and a series of changes t...
This dissertation presents a pointer analysis for Java programs, together with several practical ana...
Developing scalable and precise points-to analyses is increasingly important for analysing and optim...
Big-step abstract interpreters are an approach to build static analyzers based on big-step interpret...
Java bytecode verification forms the basis for Java-based Internet security and needs a rigorous des...
Abstract interpretation has been widely used for the analysis of object-oriented languages and, more...
Abstract interpretation has been widely used for the analysis of object-oriented languages and, in p...
AbstractAbstract interpretation has been widely used for the analysis of object-oriented languages a...
Abstract interpreters rely on the existence of a nxpoint algorithm that calculates a least upper bou...
Accuracy, completeness, and performance are all major concerns in the context of dynamic program ana...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
Points-to analysis is a static analysis that approximates which memory locations each program expres...
Program analysis is critical to many software engineering tools. However, modern programming languag...
Static analyses based on denotational semantics can naturally modelfunctional behaviours of the code...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
The aim of incremental analysis is, given a program, its analysis results, and a series of changes t...
This dissertation presents a pointer analysis for Java programs, together with several practical ana...
Developing scalable and precise points-to analyses is increasingly important for analysing and optim...
Big-step abstract interpreters are an approach to build static analyzers based on big-step interpret...
Java bytecode verification forms the basis for Java-based Internet security and needs a rigorous des...