2006
DOI: 10.1007/11767077_4
|View full text |Cite
|
Sign up to set email alerts
|

Static Detection of Access Anomalies in Ada95

Abstract: Abstract. In this paper we present data flow frameworks that are able to detect access anomalies in Ada multi-tasking programs. In particular, our approach finds all possible non-sequential accesses to shared non-protected variables. The algorithms employed are very efficient. Our approach is conservative and may find false positives.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2006
2006
2008
2008

Publication Types

Select...
5

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…It has been shown in [9] that symbolic analysis has a vast improvement potential in the area of contemporary data-flow based analyses of sequential and concurrent programs. We are therefore facing two research tiers that we plan to pursue in the future, namely (1) the extension of our method to incorporate concurrent programming language constructs, and (2) the application of our method to domain-specific static program analysis problems.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been shown in [9] that symbolic analysis has a vast improvement potential in the area of contemporary data-flow based analyses of sequential and concurrent programs. We are therefore facing two research tiers that we plan to pursue in the future, namely (1) the extension of our method to incorporate concurrent programming language constructs, and (2) the application of our method to domain-specific static program analysis problems.…”
Section: Discussionmentioning
confidence: 99%
“…The two distinguished data points in the upper right corner represent the 0.9 quantile and the 0.94 quantile. It follows from those data points that 90 percent of the 9 Hence the name ncc which stands for number of closure contexts.…”
Section: Methodsmentioning
confidence: 99%
“…If only the shown statements access the shared variables e and f we get with our algorithm one block for each of the first two threads, namely bl 1 and bl 2 , respectively. Because the third thread accesses both of the two variables two blocks are being generated, namely bl 3 and bl 4 .…”
Section: Examplementioning
confidence: 99%
“…Only the orders of bl 1 and bl 3 The third thread contains an intra-thread order bl 3 < bl 4 . Because of this the initial PO graph for every concrete interleaving (in this example) looks like the one depicted in Fig.…”
Section: Examplementioning
confidence: 99%
“…They occur when several concurrent execution threads access (write-write, or read-write) the same memory area without coordination. [16] An implementation of the analysis framework proposed by Blieberger et al [17] aims at detecting such access anomalies by means of static analysis.…”
mentioning
confidence: 99%