Precise data-flow analyses frequently model field accesses through access paths with varying length. While using longer access paths increases precision, their size must be bounded to assure termination, and should anyway be small to enable a scalable analysis. We present Access-Path Abstraction, which for the first time combines efficiency with maximal precision. At control-flow merge points Access-Path Abstraction represents all those access paths that are rooted at the same base variable through this base variable only. The full access paths are reconstructed on demand where required. This makes it unnecessary to bound access paths to a fixed maximal length. Experiments with Stanford SecuriBench and the Java Class Library compare our ope...
The ability to perform strong updates is the main contributor to the precision of flow-sensitive poi...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
In this thesis, we have developed a flow-sensitive data flow analysis framework for value set analys...
A key challenge in implementing an efficient and precise1 data flow analysis is determining how to a...
In this paper, we present a new method for supporting abstraction refinement in path-sensitive dataf...
A variable v reaches a variable w if there is a path from the memory location bound to v to the one ...
Context sensitive pointer analyses based on Whaley and Lam’s bddbddb system have been shown to scale...
Obtaining an accurate whole program path (WPP) that captures a program’s runtime behaviour in terms ...
Data-flow analysis computes its solutions over the paths in a control-flow graph. These paths---whet...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Path profiles provide a more accurate characterization of a program&s dynamic behavior than basic bl...
The ability to perform strong updates is the main contributor to the precision of flow-sensitive poi...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
Precise data-flow analyses frequently model field accesses through access paths with varying length....
In this thesis, we have developed a flow-sensitive data flow analysis framework for value set analys...
A key challenge in implementing an efficient and precise1 data flow analysis is determining how to a...
In this paper, we present a new method for supporting abstraction refinement in path-sensitive dataf...
A variable v reaches a variable w if there is a path from the memory location bound to v to the one ...
Context sensitive pointer analyses based on Whaley and Lam’s bddbddb system have been shown to scale...
Obtaining an accurate whole program path (WPP) that captures a program’s runtime behaviour in terms ...
Data-flow analysis computes its solutions over the paths in a control-flow graph. These paths---whet...
Java has been a target for many zero-day exploits in the past years. We investigate one category of ...
Path profiles provide a more accurate characterization of a program&s dynamic behavior than basic bl...
The ability to perform strong updates is the main contributor to the precision of flow-sensitive poi...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...
We present a new limited form of interprocedural analysis called field analysis that can be used by ...