Flow-Sensitive Points-to Analysis for Java']Java Programs using BDDs

被引:0
|
作者
Toussi, Hamid A. [1 ]
Rasoolzadegan, Abbas [2 ]
机构
[1] Islamic Azad Univ, Mashhad Branch, Young Res & Elites Club, Mashhad, Iran
[2] Ferdowsi Univ Mashhad, Dept Comp Engn, Mashhad, Iran
关键词
Software Engineering; Program Analysis; Points-to Analysis; Binary Decision Diagrams; SCALABLE FLOW;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Doing a flow-sensitive points-to analysis benefits many program analyses which need precise results, however, many prefer to do a flow-insensitive analysis to gain speed and overcome the memory limitations of a flow-sensitive points-to analysis. We are able to overcome these limitations by representing and manipulating points-to sets more efficiently. Binary Decision Diagrams (BDDs) have been shown to be a very efficient representation of points-to sets. A reasonable formulation of the solution is of great importance to achieve this efficiency. In this work, we formulate and employ BDDs to represent points-to sets in flow-sensitive points-to analysis for Java programs. Our method was compared with default points-to set in Soot program analysis framework (hybrid points-to set). The results are very promising and show the effectiveness of our method for sufficiently large programs.
引用
收藏
页码:380 / 386
页数:7
相关论文
共 50 条
  • [41] Combining type-analysis with points-to analysis for analyzing Java library source-code
    Oracle Labs, Brisbane, Australia
    [J]. SOAP - Proc. ACM SIGPLAN Int. Workshop State Art Program Anal., co-located PLDI, (13-18):
  • [42] No Java']Java without caffeine -: A tool for dynamic analysis of Java']Java programs
    Guéhéneuc, YG
    Douence, R
    Jussien, N
    [J]. ASE 2002: 17TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, 2002, : 117 - 126
  • [43] Using runtime analysis to guide model checking of Java']Java programs
    Havelund, K
    [J]. SPIN MODEL CHECKING AND SOFTWARE VERIFICATON, 2000, 1885 : 245 - 264
  • [44] Verification of Java']Java bytecode using analysis and transformation of logic programs
    Albert, E.
    Gomez-Zamalloa, M.
    Hubert, L.
    Puebla, G.
    [J]. PRACTICAL ASPECTS OF DECLARATIVE LANGUAGES, 2007, 4354 : 124 - +
  • [45] Dependence analysis for recursive Java']Java programs
    Xu, BW
    Chen, ZQ
    [J]. ACM SIGPLAN NOTICES, 2001, 36 (12) : 70 - 76
  • [46] Dynamic Purity Analysis for Java']Java Programs
    Xu, Haiying
    Pickett, Christopher J. F.
    Verbrugge, Clark
    [J]. PASTE'07 PROCEEDINGS OF THE 2007 ACM SIGPLAN- SIGSOFT WORKSHOP ON PROGRAM ANALYSIS FOR SOFTWARE TOOLS & ENGINEERING, 2007, : 75 - 82
  • [47] Exception analysis for multithreaded Java']Java programs
    Ryu, SY
    Yi, KK
    [J]. SECOND ASIA-PACIFIC CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2001, : 23 - 30
  • [48] A method for detecting the theft of Java']Java programs through analysis of the control flow information
    Lim, Hyun-il
    Park, Heewan
    Choi, Seokwoo
    Han, Taisook
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (09) : 1338 - 1350
  • [49] Parameter Sensitive Pointer Analysis for Java']Java
    Bao, Yulin
    Zhang, Chenyi
    Zhuo, Xilong
    Wang, Yongliang
    [J]. 2022 26TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2022), 2022, : 162 - 167
  • [50] On-Device Control Flow Verification for Java']Java Programs
    Fontaine, Arnaud
    Hym, Samuel
    Simplot-Ryl, Isabelle
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 43 - 57