2004
DOI: 10.1145/989393.989440
|View full text |Cite
|
Sign up to set email alerts
|

A safe approximate algorithm for interprocedural pointer aliasing

Abstract: HISTORYTrying to look back over a ten-plus year period and to remember what influenced us at the time, is difficult and error prone. Thus, it is probable that these reflections are incomplete. Nevertheless, it is important to our field to trace the historical influences on new ideas.Our interest in aliasing was a natural continuation of work done at Rutgers in incremental dataflow analysis in the 1980's. 1 Much of this work focused on FORTRAN, but as time went on C became a very important language and its anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
117
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 124 publications
(117 citation statements)
references
References 58 publications
0
117
0
Order By: Relevance
“…More generally, pointer or shape analysis can be used to approximate Ö ´ µ and ÛÖ Ø ´ µ [21,9,10,33]. Because È Ê Ë 's sequential core is essentially an imperative language with ÓØÓ, we expect that these existing alias analyses can be adapted to this setting.…”
Section: Race Prevention and Alias Analysismentioning
confidence: 99%
“…More generally, pointer or shape analysis can be used to approximate Ö ´ µ and ÛÖ Ø ´ µ [21,9,10,33]. Because È Ê Ë 's sequential core is essentially an imperative language with ÓØÓ, we expect that these existing alias analyses can be adapted to this setting.…”
Section: Race Prevention and Alias Analysismentioning
confidence: 99%
“…Precise, but expensive, pointer analyses have also been proposed. For example, Landi and Ryder [21] tackles the may-alias problem and they merge into an algorithm the semantic work we did in Section 3 and an abstraction (less precise than the one we present in Section 4 and 6) This fusion of two distinct aspects of the analysis prevent the reuse of the algorithm with different abstraction schemes. Wilson and Lam [31] presents a lot of similarities with our work.…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm is summary-based following in the line of Liang and Harrold, and others [75,36,73]. To obtain context sensitivity, a meta-level description of the aliasing impact of each function is maintained.…”
Section: Anatomy Of a Source Code Analysismentioning
confidence: 99%