Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems 2005
DOI: 10.1145/1065167.1065169
|View full text |Cite
|
Sign up to set email alerts
|

Context-sensitive program analysis as database queries

Abstract: Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often require analyses much more sophisticated than those traditionally used in compiler optimizations. In particular, context-sensitive pointer alias information is a prerequisite for any sound and precise analysis that reasons about uses of heap objects in a program. Context-sensitive analysis is challenging because there are over 10 14 con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
104
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 141 publications
(104 citation statements)
references
References 69 publications
0
104
0
Order By: Relevance
“…This effectively propagates information back to the source of an unknown object. Similar reasoning has been employed in other work [Livshits et al 2005;Li et al 2014]. Yet our approach generalizes past techniques significantly: we support interprocedural reasoning, leverage information from strings and not just casts, and introduce "invented" objects that fully materialize at the point of a cast and subsequently aid the analysis modeling.…”
Section: Introductionmentioning
confidence: 88%
See 2 more Smart Citations
“…This effectively propagates information back to the source of an unknown object. Similar reasoning has been employed in other work [Livshits et al 2005;Li et al 2014]. Yet our approach generalizes past techniques significantly: we support interprocedural reasoning, leverage information from strings and not just casts, and introduce "invented" objects that fully materialize at the point of a cast and subsequently aid the analysis modeling.…”
Section: Introductionmentioning
confidence: 88%
“…• We augment prior algorithms for inter-related reflection and points-to analysis [Livshits et al 2005;Livshits 2006] with a substring analysis, as well as a string flow analysis. The insight behind this treatment is that reflection is often used to dynamically access entities with partially known names, and the dynamic part of the configuration is limited to package prefixes, method name suffixes, etc.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the filtered generator sets are potentially much smaller than the original sets, thus resulting in a Cartesian product much smaller than the original one. In this small example the filtered generator sets for l, p and f are all reduced from [0, 9] to respectively [1,8], [2,9] and [1,8]. Our approach is inspired by the well-known bounds consistency technique [5], in CP implemented by finite-domain constraint propagators.…”
Section: % Rest Of the Original Lp+fp=pl Programmentioning
confidence: 99%
“…In recent years, there has been a resurgence of interest in Datalog as the foundation for applied, domain-specific languages in a wide variety of areas, including networking [20], distributed systems [5,8], natural language processing [11], robotics [4], compiler analysis [14], security [13,17,32] and computer games [31]. The resulting languages have been promoted for their compact and natural representations of tasks in their respective domains, in many cases leading to code that is orders of magnitude shorter than equivalent imperative programs.…”
Section: Introductionmentioning
confidence: 99%