AbstractThe project Safe Pointers by Graph Transformation at the University of York has developed a method for specifying the shape of pointer-data structures by graph reduction, and a static checking algorithm for proving the shape safety of graph transformation rules modelling operations on pointer structures. In this paper, we outline how to apply this approach to the C programming language. We extend ANSI C with so-called transformers which model graph transformation rules, and with shape specifications for pointer structures. For the resulting language C-GRS, we present both a translation to C and and an abstraction to graph transformation. Our main result is that the abstraction of transformers to graph transformation rules is correct...
Based on the algebra of relations and maps we present some techniques for safe manipulation of point...
Based on the algebra of relations and maps we present some techniques for safe manipulation of point...
In recent years researchers have presented several tools for statically checking security properties...
AbstractThe project Safe Pointers by Graph Transformation at the University of York has developed a ...
Type systems currently available for imperative languages are too weak to detect a significant class...
In contemporary computer systems, data layout has great influence on performance. Traditionally, aut...
Owing to the continued use of C (and C++), spatial safety violations (e.g., buffer overflows) still ...
Owing to the continued use of C (and C++), spatial safety violations (e.g., buffer overflows) still ...
Abstract. We consider the verification of non-recursive C programs manipulating dynamic linked data ...
Abstract. We consider the verification of non-recursive C programs manipulat-ing dynamic linked data...
C’s unsafe language features such as pointer arithmetic, type casts, and explicit memory management ...
AbstractThis paper presents a novel method for shape analysis, which can deal with complex expressio...
We propose an original approach for checking memory safety of C pointer programs possibly including ...
We propose an original approach for checking memory safety of C pointer programs possibly including ...
We propose an original approach for checking memory safety of C pointer programs possibly including ...
Based on the algebra of relations and maps we present some techniques for safe manipulation of point...
Based on the algebra of relations and maps we present some techniques for safe manipulation of point...
In recent years researchers have presented several tools for statically checking security properties...
AbstractThe project Safe Pointers by Graph Transformation at the University of York has developed a ...
Type systems currently available for imperative languages are too weak to detect a significant class...
In contemporary computer systems, data layout has great influence on performance. Traditionally, aut...
Owing to the continued use of C (and C++), spatial safety violations (e.g., buffer overflows) still ...
Owing to the continued use of C (and C++), spatial safety violations (e.g., buffer overflows) still ...
Abstract. We consider the verification of non-recursive C programs manipulating dynamic linked data ...
Abstract. We consider the verification of non-recursive C programs manipulat-ing dynamic linked data...
C’s unsafe language features such as pointer arithmetic, type casts, and explicit memory management ...
AbstractThis paper presents a novel method for shape analysis, which can deal with complex expressio...
We propose an original approach for checking memory safety of C pointer programs possibly including ...
We propose an original approach for checking memory safety of C pointer programs possibly including ...
We propose an original approach for checking memory safety of C pointer programs possibly including ...
Based on the algebra of relations and maps we present some techniques for safe manipulation of point...
Based on the algebra of relations and maps we present some techniques for safe manipulation of point...
In recent years researchers have presented several tools for statically checking security properties...