Probabilistic Alias Analysis of Executable Code

被引:1
|
作者
Lu, Yu-Min [1 ]
Chen, Peng-Sheng [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, High Performance Comp Lab, Chiayi, Taiwan
关键词
Alias analysis; Compiler; Post-link optimizer; Optimization;
D O I
10.1007/s10766-010-0157-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we present a method for flow-sensitive, context-insensitive probabilistic alias analysis at the assembly level. A memory disambiguation algorithm is also developed for revealing the probability of two registers holding the same memory location. The alias analysis and memory disambiguation algorithms are implemented based on the Diablo post-link optimizer. Experimental results show that the technique can estimate the probabilities that registers refer to the same memory address in benchmark programs with an overall average error of about 6.8%. The post-link optimizer can leverage the obtained quantitative information to facilitate aggressive analyses and optimizations.
引用
收藏
页码:663 / 693
页数:31
相关论文
共 50 条
  • [21] A Generic Approach to Automatic Deobfuscation of Executable Code
    Yadegari, Babak
    Johannesmeyer, Brian
    Whitely, Benjamin
    Debray, Saumya
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 674 - 691
  • [22] Executable Program Code Segment Address Randomization
    Lin, Jian
    Guo, Yu-dong
    Man, Yu-jia
    Zhou, Shao-huang
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA), 2015, : 345 - 350
  • [23] Compiling business process models into executable code
    Faculty of Informatics, University of Lugano, Switzerland
    Handbook of Res. on Bus. Proc. Modeling, 1600, (318-337):
  • [24] Code generation for a family of executable modelling notations
    Prout, Adam
    Atlee, Joanne M.
    Day, Nancy A.
    Shaker, Pourya
    Software and Systems Modeling, 2012, 11 (02): : 251 - 272
  • [25] Code generation for a family of executable modelling notations
    Adam Prout
    Joanne M. Atlee
    Nancy A. Day
    Pourya Shaker
    Software & Systems Modeling, 2012, 11 : 251 - 272
  • [26] Comparative Analysis of Probabilistic Analysis and Deterministic Analysis by RESRAD Code
    Park, Sang June
    Byon, Jihyang
    Ahn, Seokyoung
    ENERGIES, 2020, 13 (08)
  • [27] Code generation for a family of executable modelling notations
    Prout, Adam
    Atlee, Joanne M.
    Day, Nancy A.
    Shaker, Pourya
    SOFTWARE AND SYSTEMS MODELING, 2012, 11 (02): : 251 - 272
  • [28] Safe worst-case execution time analysis by abstract interpretation of executable code
    Kaestner, Daniel
    ACM SIGPLAN NOTICES, 2007, 42 (07) : 135 - 135
  • [29] Safe Worst-Case Execution Time Analysis by Abstract Interpretation of Executable Code
    Kaestner, Daniel
    LCTES'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN-SIGBED CONFERENCE ON LANGUAGES, COMPILERS, AND TOOLS FOR EMBEDDED SYSTEMS, 2007, : 135 - 135
  • [30] Querying distilled code changes to extract executable transformations
    Reinout Stevens
    Tim Molderez
    Coen De Roover
    Empirical Software Engineering, 2019, 24 : 491 - 535