We present an algorithm for extracting control flow graphs from Java bytecode that captures normal as well as exceptional control flow. We prove its correctness, in the sense that the behaviour of the extracted control flow graph is a sound over-approximation of the behaviour of the original program. This makes control flow graphs suitable for performing various static analyses, such as model checking of temporal safety properties. Analysing exceptional control flow for Java bytecode is difficult because of the stack-based nature of the language. We therefore develop the extraction in two stages. In the first, we abstract away from the complications arising from exceptional flows, and relativize the extraction on an oracle that is able to l...
Program analysis has a long history in computer science. Even when only considering the important as...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...
We present an algorithm to extract control-flow graphs from Java bytecode, considering exceptional f...
Control flow graphs (CFGs) are abstract program models that preserve the control flow information. T...
Abstract. The modular analysis of control flow of incomplete Java byte-code programs is challenging,...
Formal verification techniques have been widely deployed as means to ensure the quality of software ...
The most of the analyses evaluating the quality of code are derived from Control Flow Graphs -- CFG....
Abstract. A control flow graph represents all the flows of control that may arise during program exe...
Understanding control ows in a computer program is essential for many software engineering tasks su...
Accurate representations of program control flow are important to the soundness and efficiency of pr...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
We show that the control flow graphs of Java programs, due to the labelled break and continue statem...
Java exception checks are designed to ensure that any faulting instruction causing a hardware except...
AbstractUsing transactions in Java Card bytecode programs can be rather tricky and requires special ...
Program analysis has a long history in computer science. Even when only considering the important as...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...
We present an algorithm to extract control-flow graphs from Java bytecode, considering exceptional f...
Control flow graphs (CFGs) are abstract program models that preserve the control flow information. T...
Abstract. The modular analysis of control flow of incomplete Java byte-code programs is challenging,...
Formal verification techniques have been widely deployed as means to ensure the quality of software ...
The most of the analyses evaluating the quality of code are derived from Control Flow Graphs -- CFG....
Abstract. A control flow graph represents all the flows of control that may arise during program exe...
Understanding control ows in a computer program is essential for many software engineering tasks su...
Accurate representations of program control flow are important to the soundness and efficiency of pr...
We present a flow and context sensitive compositional information flow analysis for full (mono-threa...
We show that the control flow graphs of Java programs, due to the labelled break and continue statem...
Java exception checks are designed to ensure that any faulting instruction causing a hardware except...
AbstractUsing transactions in Java Card bytecode programs can be rather tricky and requires special ...
Program analysis has a long history in computer science. Even when only considering the important as...
Language-based information flow control (IFC) is a powerful tool to discover security leaks in softw...
This thesis proposes a methodology for an acquisition of dependencies between outputs and inputs in ...