Inferring Local (Non-)Aliasing and Strings for Memory Safety 1

A guide beam and tracking system for steering a flying body toward a target in accordance with the beam rider principle, is constructed for use under adverse weather conditions. Even under such adverse weather conditions a highly accurate target acquisition is assured due to the use of optical conversion, and beam expansion in the transmitter path, and heterodyning in the laser receiver. It is thus possible to achieve in addition to the highly accurate target acquisition, an accurate tracking of a flying body moving toward a target, under the control of a guide beam device.

[1]  Richard Bornat,et al.  Proving Pointer Programs in Hoare Logic , 2000, MPC.

[2]  L. D. Moura,et al.  The YICES SMT Solver , 2006 .

[3]  Peter W. O'Hearn,et al.  Footprint Analysis: A Shape Analysis That Discovers Preconditions , 2007, SAS.

[4]  Bor-Yuh Evan Chang,et al.  Abstract Interpretation with Alien Expressions and Heap Structures , 2005, VMCAI.

[5]  Gary T. Leavens,et al.  JML: notations and tools supporting detailed design in Java , 2000 .

[6]  John C. Reynolds,et al.  Intuitionistic reasoning about shared mutable data structure , 1999 .

[7]  Shuvendu K. Lahiri,et al.  A Reachability Predicate for Analyzing Low-Level Software , 2007, TACAS.

[8]  Robert E. Strom,et al.  Typestate: A programming language concept for enhancing software reliability , 1986, IEEE Transactions on Software Engineering.

[9]  Antoine Miné,et al.  The octagon abstract domain , 2001, High. Order Symb. Comput..

[10]  Michael Rodeh,et al.  CSSV: towards a realistic tool for statically detecting all buffer overflows in C , 2003, PLDI '03.

[11]  Zhe Yang,et al.  Modular checking for buffer overflows in the large , 2006, ICSE.

[12]  David Detlefs,et al.  Simplify: a theorem prover for program checking , 2005, JACM.

[13]  Norihisa Suzuki,et al.  Implementation of an array bound checker , 1977, POPL.

[14]  Bor-Yuh Evan Chang,et al.  Boogie: A Modular Reusable Verifier for Object-Oriented Programs , 2005, FMCO.

[15]  Chao Wang,et al.  Using Statically Computed Invariants Inside the Predicate Abstraction and Refinement Loop , 2006, CAV.

[16]  David A. Wagner,et al.  A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.

[17]  Satish Chandra,et al.  Coping with type casts in C , 1999, ESEC/FSE-7.

[18]  Dawson R. Engler,et al.  ARCHER: using symbolic, path-sensitive analysis to detect memory access errors , 2003, ESEC/FSE-11.

[19]  Patrick Cousot,et al.  Systematic design of program analysis frameworks , 1979, POPL.

[20]  François Bourdoncle,et al.  Assertion-based Debugging of Imperative Programs by Abstract Interpretation , 1993, ESEC.

[21]  George C. Necula,et al.  CCured: type-safe retrofitting of legacy code , 2002, SIGP.

[22]  David Ryan Koes,et al.  Programmer specified pointer independence , 2004, MSP '04.

[23]  Rupak Majumdar,et al.  State of the Union: Type Inference Via Craig Interpolation , 2007, TACAS.

[24]  Roberto Giacobazzi,et al.  The Reduced Relative Power Operation on Abstract Domains , 1999, Theor. Comput. Sci..

[25]  Alexander Aiken,et al.  Checking and inferring local non-aliasing , 2003, PLDI '03.