Proceedings of the 4th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages - POPL '77 1977
DOI: 10.1145/512950.512963
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of an array bound checker

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

1980
1980
2012
2012

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(47 citation statements)
references
References 5 publications
0
47
0
Order By: Relevance
“…2]). We only consider functions with scalar inputs such as g (7,8). We note that existing dynamic analysis methods cannot find these array relations either.…”
Section: B Results Qualitymentioning
confidence: 99%
See 1 more Smart Citation
“…2]). We only consider functions with scalar inputs such as g (7,8). We note that existing dynamic analysis methods cannot find these array relations either.…”
Section: B Results Qualitymentioning
confidence: 99%
“…Array invariants involving user-defined functions, e.g., [7]. Our approach extends to invariants involving function composition, such as g (f (A[.…”
Section: Functionsmentioning
confidence: 99%
“…Initial inputs to the untrusted program were annotated with typestate information and linear constraints. The analyses developed by Xu et al were based on classical theorem-proving techniques: the typestate-checking algorithm used the induction-iteration method [30] to synthesize loop invariants and Omega [23] to decide Presburger formulas. In contrast, the goal of the system described in the present paper is to recover information from an x86 executable that permits the creation of intermediate representations similar to those that can be created for a program written in a high-level language.…”
Section: Related Workmentioning
confidence: 99%
“…Many program analysis and verification algorithms and tools have the need to solve linear integer constraints or its extensions, such as for checking array bounds to ensure memory safety [15,38,16,35] and for detecting buffer overruns for security applications [36], and for array dependency analysis for parallel compilers [31,32,29,33,7,6]. However, solving integer linear constraints is a difficult problem [22], and only very special cases have efficient algorithms [30,3].…”
Section: Introductionmentioning
confidence: 99%