2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation 2014
DOI: 10.1109/scam.2014.40
|View full text |Cite
|
Sign up to set email alerts
|

Fast Flow Analysis with Godel Hashes

Abstract: Abstract-Flow analysis, such as control-flow, data-flow, and exception-flow analysis, usually depends on relational operations on flow sets. Unfortunately, set related operations, such as inclusion and equality, are usually very expensive. They can easily take more than 97% of the total analyzing time, even in a very simple analysis. We attack this performance bottleneck by proposing Gödel hashes to enable fast and precise flow analysis. Gödel hashes is an ultra compact, partial-order-preserving, fast and perf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Their features focused primarily on binary strings, but can be extended by the development of a custom hashing function. Liang et al applied partial order preserving hashing via Gödel hashes to obtain an increase in algorithm performance on existing benchmarks for program flow analysis [20,21].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Their features focused primarily on binary strings, but can be extended by the development of a custom hashing function. Liang et al applied partial order preserving hashing via Gödel hashes to obtain an increase in algorithm performance on existing benchmarks for program flow analysis [20,21].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Studies closer to the one performed in this paper, such as [14,26] try to directly classify an application as malicious or benign through permission request analysis for application installation [8], or control ow analysis [18]. ese works take di erent approaches in both the feature extraction and the classi cation phase.…”
Section: Related Workmentioning
confidence: 99%
“…Second, WALA has been significantly optimized by the IBM research lab, particularly with underlying Java (collection) libraries rewritten specifically for its framework. Our implementation is based on Scala's default data structures and our specialized Gödel hashing data structure [23]. Last but not least, the analysis time is reasonably acceptable, given the high precision that our analysis technique can provide.…”
Section: Analysis Timementioning
confidence: 99%