Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation 2001
DOI: 10.1145/378795.378802
|View full text |Cite
|
Sign up to set email alerts
|

Demand-driven pointer analysis

Abstract: Known algorithms for pointer analysis are "global" in the sense that they perform an exhaustive analysis of a program or program component. In this paper we introduce a demand-driven approach for pointer analysis. Specifically, we describe a demand-driven flow-insensitive, subset-based, context-insensitive points-to analysis. Given a list of pointer variables (a query), our analysis performs just enough computation to determine the points-to sets for these query variables. Using deductive reachability formulat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
55
0

Year Published

2003
2003
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 107 publications
(55 citation statements)
references
References 16 publications
0
55
0
Order By: Relevance
“…The rules in Figure 3 are similar to the inference rules for demand driven analysis in [19]. The mode based specialization presented here is straightforward.…”
Section: Demand-driven Pointer Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…The rules in Figure 3 are similar to the inference rules for demand driven analysis in [19]. The mode based specialization presented here is straightforward.…”
Section: Demand-driven Pointer Analysismentioning
confidence: 99%
“…To simplify our presentation, we assume that the program is decomposed to a set of primitive assignment statements of the following form: Figure 1 shows the points-to analysis rules for each assignment statements (from [19]). In the figure x −→ y denotes that x may point to y.…”
Section: A Deductive Formulation Of Pointer Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Since this relationship can describe the flow of information inside the program, so many analysts use it to analyze the security problem. The points-to relationship is widely used in the dataflow analysis [12,13]. SPARK [14] does a lot of work in points-to analysis, but it aims to optimize the performance of the program, so its definition of the start of points-to relationship dose not meets the security analysis.…”
Section: Related Workmentioning
confidence: 99%