Region-based shape analysis with tracked locations
暂无分享,去创建一个
[1] Saman Amarasinghe,et al. The suif compiler for scalable parallel machines , 1995 .
[2] Eran Yahav,et al. Verifying safety properties of concurrent Java programs using 3-valued logic , 2001, POPL '01.
[3] Thomas W. Reps,et al. Putting static analysis to work for verification: A case study , 2000, ISSTA '00.
[4] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[5] Viktor Kuncak,et al. Role analysis , 2002, POPL '02.
[6] Reinhard Wilhelm,et al. Shape Analysis , 2000, CC.
[7] Donglin Liang,et al. Efficient points-to analysis for whole-program analysis , 1999, ESEC/FSE-7.
[8] Reinhard Wilhelm,et al. Solving shape-analysis problems in languages with destructive updating , 1998, TOPL.
[9] Sorin Lerner. Path-Sensitive Program Veri cation in Polynomial Time , 2002 .
[10] Bertrand Jeannet,et al. A Relational Approach to Interprocedural Shape Analysis , 2004, SAS.
[11] Alexandru Nicolau,et al. A general data dependence test for dynamic, pointer-based data structures , 1994, PLDI '94.
[12] Sorin Lerner,et al. ESP: path-sensitive program verification in polynomial time , 2002, PLDI '02.
[13] Robert DeLine,et al. Enforcing high-level protocols in low-level software , 2001, PLDI '01.
[14] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[15] Peter W. O'Hearn,et al. BI as an assertion language for mutable data structures , 2001, POPL '01.
[16] Stephen Chong,et al. Static Analysis of Accessed Regions in Recursive Data Structures , 2003, SAS.
[17] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000, Softw. Pract. Exp..
[18] Matthias Hauswirth,et al. Low-overhead memory leak detection using adaptive statistical profiling , 2004, ASPLOS XI.
[19] Alexandru Nicolau,et al. Parallelizing Programs with Recursive Data Structures , 1989, IEEE Trans. Parallel Distributed Syst..
[20] Reinhard Wilhelm,et al. Parametric shape analysis via 3-valued logic , 1999, POPL '99.
[21] Shmuel Sagiv,et al. TVLA: A System for Implementing Static Analyses , 2000, SAS.
[22] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[23] Eran Yahav,et al. Verifying safety properties using separation and heterogeneous abstractions , 2004, PLDI '04.
[24] Peter W. O'Hearn,et al. Separation and information hiding , 2004, POPL.
[25] RuginaRadu,et al. Region-based shape analysis with tracked locations , 2005 .
[26] Laurie J. Hendren,et al. Is it a tree, a DAG, or a cyclic graph? A shape analysis for heap-directed pointers in C , 1996, POPL '96.
[27] John C. Reynolds,et al. Separation logic: a logic for shared mutable data structures , 2002, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science.
[28] Olivier Tardieu,et al. Demand-driven pointer analysis , 2001, PLDI '01.
[29] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[30] Michael Rodeh,et al. Checking Cleanness in Linked Lists , 2000, SAS.
[31] Frédéric Vivien,et al. Incrementalized pointer and escape analysis , 2001, PLDI '01.
[32] Jakob Rehof,et al. Scalable context-sensitive flow analysis using instantiation constraints , 2000, PLDI '00.
[33] Monica S. Lam,et al. A practical flow-sensitive and context-sensitive C and C++ memory leak detector , 2003, PLDI '03.
[34] Bjarne Steensgaard,et al. Points-to analysis in almost linear time , 1996, POPL '96.
[35] Noam Rinetzky,et al. Interprocedural Shape Analysis for Recursive Programs , 2001, CC.