In this work we present a type graph that models all executable constructs of the Java programming language. Such a model is useful for any graph-based technique that relies on a representation of Java programs as graphs. The model can be regarded as a common representation to which all Java syntax graphs must adhere. We also present the systematic approach that is being taken to generate syntax graphs from Java code. Since the type graph model is comprehensive, i.e., covers the whole language specification, the technique is guaranteed to generate a corresponding graph for any valid Java program. In particular, we want to extract such syntax graphs in order to perform static analysis and model checking of programs written in Java. Although ...
syntax graph of a Java program. The extracted state machine offers a reduced view on the full progra...
Developing static analyzers requires an intensive handling of tree and graph structures representing...
The need to protect computers from malicious software is ongoing. One approach uses static analysis ...
In this report we present a type graph that models all executable constructs of the Java programming...
dr. P.M. van den Broek dr. ir. A. Rensink Summary Model checking is used to find problems in softwar...
Abstract. This paper introduces an approach for adding graph transformation-based functionality to e...
This paper introduces an approach for adding graph transformation-based functionality to existing JA...
Abstract. We present an algorithm to extract control-flow graphs from Java bytecode, considering exc...
This article proposes a case study to evaluate the suitability of graph transformation tools for pro...
The Program Dependence Graph was introduced by Ottenstein and Ottenstein in 1984 [14]. It was sugges...
Scope graphs are a promising generic framework to model the binding structures of programming langua...
In this paper we present a graph drawing framework that can be used to automatically draw UML class...
Modern Java IDE aim at assisting object-oriented software development workflows with continuously in...
In this paper we present a tool environment for semi-automatic verification of basic programming exe...
Several software development techniques involve the generation of graph-based representations of a p...
syntax graph of a Java program. The extracted state machine offers a reduced view on the full progra...
Developing static analyzers requires an intensive handling of tree and graph structures representing...
The need to protect computers from malicious software is ongoing. One approach uses static analysis ...
In this report we present a type graph that models all executable constructs of the Java programming...
dr. P.M. van den Broek dr. ir. A. Rensink Summary Model checking is used to find problems in softwar...
Abstract. This paper introduces an approach for adding graph transformation-based functionality to e...
This paper introduces an approach for adding graph transformation-based functionality to existing JA...
Abstract. We present an algorithm to extract control-flow graphs from Java bytecode, considering exc...
This article proposes a case study to evaluate the suitability of graph transformation tools for pro...
The Program Dependence Graph was introduced by Ottenstein and Ottenstein in 1984 [14]. It was sugges...
Scope graphs are a promising generic framework to model the binding structures of programming langua...
In this paper we present a graph drawing framework that can be used to automatically draw UML class...
Modern Java IDE aim at assisting object-oriented software development workflows with continuously in...
In this paper we present a tool environment for semi-automatic verification of basic programming exe...
Several software development techniques involve the generation of graph-based representations of a p...
syntax graph of a Java program. The extracted state machine offers a reduced view on the full progra...
Developing static analyzers requires an intensive handling of tree and graph structures representing...
The need to protect computers from malicious software is ongoing. One approach uses static analysis ...