In this thesis, we have developed a flow-sensitive data flow analysis framework for value set analyses for Java-like languages. Our analysis frame work is based on access paths—a variable followed by zero or more field accesses. We express our abstract states as maps from bounded access paths to abstract value sets. Using access paths instead of allocation sites enables us to perform strong updates on assignments to dynamically allocated memory locations. We also describe several optimizations to reduce the number of access paths that need to be tracked in our analysis. We have instantiated this frame work for flow-sensitive pointer and null-pointer analysis for Java. We have implemented our analysis inside the Chord frame work. A major pa...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
Data flow analysis is a well studied family of static program analyses. A rich theoretical basis for...
Many current program analyses require highly precise pointer information about small, tar- geted pa...
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
The ability to perform strong updates is the main contributor to the precision of flow-sensitive poi...
Context sensitive pointer analyses based on Whaley and Lam’s bddbddb system have been shown to scale...
With the proliferation of concurrent software systems, automated finite state verification technique...
The memory hierarchy in modern architectures continues to be a major performance bottleneck. Many ex...
This paper presents a context-sensitive and path-sensitive, intra-thread and inter-thread solution t...
This thesis presents the design, implementation, and evaluation of Flow Java, a programming language...
Points-to analysis is a static analysis that approximates which memory locations each program expres...
This dissertation presents a pointer analysis for Java programs, together with several practical ana...
This thesis presents the design, implementation, and evaluation of Flow Java, a programming language...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
Data flow analysis is a well studied family of static program analyses. A rich theoretical basis for...
Many current program analyses require highly precise pointer information about small, tar- geted pa...
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
The ability to perform strong updates is the main contributor to the precision of flow-sensitive poi...
Context sensitive pointer analyses based on Whaley and Lam’s bddbddb system have been shown to scale...
With the proliferation of concurrent software systems, automated finite state verification technique...
The memory hierarchy in modern architectures continues to be a major performance bottleneck. Many ex...
This paper presents a context-sensitive and path-sensitive, intra-thread and inter-thread solution t...
This thesis presents the design, implementation, and evaluation of Flow Java, a programming language...
Points-to analysis is a static analysis that approximates which memory locations each program expres...
This dissertation presents a pointer analysis for Java programs, together with several practical ana...
This thesis presents the design, implementation, and evaluation of Flow Java, a programming language...
Field-sensitive static analyses of object-oriented code use approximations of the computational stat...
Data flow analysis is a well studied family of static program analyses. A rich theoretical basis for...
Many current program analyses require highly precise pointer information about small, tar- geted pa...