2014
DOI: 10.1145/2714064.2660213
|View full text |Cite
|
Sign up to set email alerts
|

Efficient subcubic alias analysis for C

Abstract: Inclusion-based alias analysis for C can be formulated as a context-free language (CFL) reachability problem. It is well known that the traditional cubic CFL-reachability algorithm does not scale well in practice. We present a highly scalable and efficient CFL-reachability-based alias analysis for C. The key novelty of our algorithm is to propagate reachability information along only original graph edges and bypass a large portion of summary edges, while the traditional CFL-reachability algorithm propagates al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 47 publications
0
10
0
Order By: Relevance
“…CFL-reachability can be used to formulate many static analyses, such as polymorphic ow analysis [24], shape analysis [27], context-insensitive [38,52] and contextsensitive [38,46] points-to analysis, and information ow analysis [20]. The work in [16,22] studies the connection between CFL-reachability and set-constraints, shows the connection between the two problems.…”
Section: Related Workmentioning
confidence: 99%
“…CFL-reachability can be used to formulate many static analyses, such as polymorphic ow analysis [24], shape analysis [27], context-insensitive [38,52] and contextsensitive [38,46] points-to analysis, and information ow analysis [20]. The work in [16,22] studies the connection between CFL-reachability and set-constraints, shows the connection between the two problems.…”
Section: Related Workmentioning
confidence: 99%
“…We let {l, u} be two symbols dened within the program code. Like the vast majority of pointer analyses available in the compiler literature, from Andersen's work [Andersen, 1994] to the more recent technique of Zhang et al [Zhang et al, 2014], our method is correct if the underlying program is also correct. In other words, our results are sound with respect to the semantics of the program if this program has no undened behavior, such as out-of-bounds accesses.…”
Section: Solutionmentioning
confidence: 99%
“…Given this importance, it comes as no surprise that pointer analysis has been one of the most researched topics within the eld of compiler construction [Hind, 2001]. This research has contributed to make the present algorithms more precise [Hardekopf and Lin, 2007;Zhang et al, 2014], and faster [Hardekopf and Lin, 2011;Shang et al, 2012]. Nevertheless, one particular feature of imperative programming languages remains to be handled satisfactorily by the current state-of-the-art approaches: the disambiguation of pointer intervals.…”
Section: Introductionmentioning
confidence: 99%
“…Two nodes are L-reachable in G if there exists a path joining them, and the path string belongs to L. In the literature, the most popular L-reachability formulation is Dyck-reachability [11,27]. A Dyck language essentially generates well-balanced parentheses, which can be used to capture well-paired program properties, such as function calls/returns [17,18,24], pointer references/dereferences [29,30], locks/unlocks [10,15], and ield reads/writes [9,26,27].…”
Section: Introductionmentioning
confidence: 99%