Probabilistic Alias Analysis of Executable Code

被引:1
|
作者
Lu, Yu-Min [1 ]
Chen, Peng-Sheng [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, High Performance Comp Lab, Chiayi, Taiwan
关键词
Alias analysis; Compiler; Post-link optimizer; Optimization;
D O I
10.1007/s10766-010-0157-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we present a method for flow-sensitive, context-insensitive probabilistic alias analysis at the assembly level. A memory disambiguation algorithm is also developed for revealing the probability of two registers holding the same memory location. The alias analysis and memory disambiguation algorithms are implemented based on the Diablo post-link optimizer. Experimental results show that the technique can estimate the probabilities that registers refer to the same memory address in benchmark programs with an overall average error of about 6.8%. The post-link optimizer can leverage the obtained quantitative information to facilitate aggressive analyses and optimizations.
引用
收藏
页码:663 / 693
页数:31
相关论文
共 50 条
  • [1] Probabilistic Alias Analysis of Executable Code
    Yu-Min Lu
    Peng-Sheng Chen
    International Journal of Parallel Programming, 2011, 39 : 663 - 693
  • [2] Speculative alias analysis for executable code
    Fernández, M
    Espasa, R
    2002 INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PROCEEDINGS, 2002, : 222 - 231
  • [3] Accurate instruction-level alias analysis for arm executable code
    Chong, Tat-Wai
    Chen, Peng-Sheng
    Smart Innovation, Systems and Technologies, 2013, 21 : 657 - 667
  • [4] Alias analysis: Beyond the code
    Sridharan, M. (msridhar@us.ibm.com), 1600, Springer Verlag (7850):
  • [5] Executable source code and non-executable source code: analysis and relationships
    Robles, G
    Gonzalez-Barahona, JM
    FOURTH IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2004, : 149 - 157
  • [6] Analysis of complexity metrics of a software code for obfuscating transformations of an executable code
    Kuznetsov, M. A.
    Surkov, V. O.
    XII INTERNATIONAL SCIENTIFIC AND RESEARCH CONFERENCE TOPICAL ISSUES IN AERONAUTICS AND ASTRONAUTICS, 2016, 155
  • [7] Differential compression of executable code
    Motta, Giovanni
    Gustsfson, James
    Chen, Samson
    DCC 2007: DATA COMPRESSION CONFERENCE, PROCEEDINGS, 2007, : 103 - +
  • [8] Disassembly of executable code revisited
    Schwarz, B
    Debray, S
    Andrews, G
    NINTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2002, : 45 - 54
  • [9] DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis
    Kim, Dongwoo
    Kwak, Jin
    Ryou, Jaecheol
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [10] Alias verification for Fortran code optimization
    Nguyen, TVN
    Irigoin, F
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2003, 9 (03) : 270 - 297