115 Hits in 3.7 sec

A lightweight visualization of interprocedural data-flow paths for source code reading

Takashi Ishio, Shogo Etsuda, Katsuro Inoue
2012 2012 20th IEEE International Conference on Program Comprehension (ICPC)  
To understand the behavior of a program, developers must read source code fragments in various modules.  ...  In addition, we report our lightweight data-flow analysis can generate precise data-flow paths for 98% of Java methods.  ...  DATA-FLOW VISUALIZATION We propose a data-flow visualization for developers to investigate interprocedural data-flow paths.  ... 
doi:10.1109/icpc.2012.6240506 dblp:conf/iwpc/IshioEI12 fatcat:3xwu5zlpw5g5reqx7yepu2ps64

Variable Data-Flow Graph for Lightweight Program Slicing and Visualization

Yu KASHIMA, Takashi ISHIO, Shogo ETSUDA, Katsuro INOUE
2015 IEICE transactions on information and systems  
Systemdependence-graph-based (SDG) program slicing is a good candidate for supporting the investigation of data-flow paths among modules, as SDG is capable of showing the data-dependence of focused program  ...  To understand the behavior of a program, developers often need to read source code fragments in various modules.  ...  Takeshi Murayama and developers of Hitachi Government & Public Corporation System Engineering, Ltd. for supporting our experiment. This work was supported by JSPS KAKENHI Grant Number 26280021.  ... 
doi:10.1587/transinf.2014edp7395 fatcat:xi6etbldknfndmwigp57n2jjce

CSIclipse: presenting crash analysis data to developers

Peter Ohmann, Ben Liblit
2015 Proceedings of the on Eclipse Technology eXchange - ETX 2015  
The goal of our plugin is to ease the burden of debugging production failures by conveniently presenting CSI trace and analysis data with intuitive source code overlays and powerful data exploration mechanisms  ...  While designed for our CSI data, our plugin is likely general enough to support trace data from a variety of program analyses.  ...  Opinions, findings, conclusions, or recommendations expressed herein are those of the authors and do not necessarily reflect the views of NSF or other institutions.  ... 
doi:10.1145/2846650.2846651 dblp:conf/eclipse/OhmannL15 fatcat:gty7zse3qzglpezw34touow4ya


Andrew Ayers, Richard Schooler, Chris Metcalf, Anant Agarwal, Junghwan Rhee, Emmett Witchel
2005 Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation - PLDI '05  
Post-facto reconstruction of the records written by the instrumentation code produces a source-statement trace for user diagnosis.  ...  The user can see how the program reached the fault state without having to re-run the computation; in effect enabling a limited form of a debugger in production code.  ...  Thanks to Kathryn McKinley, Michael Bond, and the anonymous reviewers for commenting on earlier drafts of this paper.  ... 
doi:10.1145/1065010.1065035 dblp:conf/pldi/AyersSMARW05 fatcat:x7p4ebxxijfypclcfdwzfxvt7u


Andrew Ayers, Richard Schooler, Chris Metcalf, Anant Agarwal, Junghwan Rhee, Emmett Witchel
2005 SIGPLAN notices  
Post-facto reconstruction of the records written by the instrumentation code produces a source-statement trace for user diagnosis.  ...  The user can see how the program reached the fault state without having to re-run the computation; in effect enabling a limited form of a debugger in production code.  ...  Thanks to Kathryn McKinley, Michael Bond, and the anonymous reviewers for commenting on earlier drafts of this paper.  ... 
doi:10.1145/1064978.1065035 fatcat:c4fgrrqrfbgvhbcu4sr773gxfa

Continuous code-quality assurance with SAFE

Emmanuel Geay, Eran Yahav, Stephen Fink
2006 Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation - PEPM '06  
This paper presents the design of SAFE (Scalable and Flexible Error Detection), a static analysis tool targeting lightweight program verification and bug finding for Java.  ...  The tool utilizes two types of analysis: a simple "structural" checker based on pattern-matching, and an interprocedural flow-sensitive dataflow solver which integrates typestate checking and alias analysis  ...  Acknowledgements Many thanks to Steve Gutz for his contributions to the SAFE Eclipse environment.  ... 
doi:10.1145/1111542.1111567 dblp:conf/pepm/GeayYF06 fatcat:y4hldejj6rf6nlca3dn65xho54

Precise Data Flow Analysis in the Presence of Correlated Method Calls [chapter]

Marianna Rapoport, Ondřej Lhoták, Frank Tip
2015 Lecture Notes in Computer Science  
We show how infeasible paths due to correlated calls can be eliminated for Interprocedural Finite Distributive Subset (IFDS) problems, a large class of data-flow analysis problems with broad applications  ...  Existing algorithms for data-flow analysis are unable to ignore such infeasible paths, giving rise to loss of precision.  ...  Therefore, evaluating the composed data-flow function for a control flow path corresponds to finding reachable nodes in a graph composed from the representation relations of the data-flow functions for  ... 
doi:10.1007/978-3-662-48288-9_4 fatcat:caacvwhqv5faxbrkef7j6vqihe

Static memory leak detection using full-sparse value-flow analysis

Yulei Sui, Ding Ye, Jingling Xue
2012 Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012  
Saber tracks the flow of values from allocation to free sites using a sparse valueflow graph (SVFG) that captures def-use chains and value flows via assignments for all memory locations represented by  ...  By exploiting field-, flow-and context-sensitivity during different phases of the analysis, Saber detects leaks in a program by solving a graph reachability problem on its SVFG.  ...  For each source, there is one value-flow path connecting it to one sink. Cond represents the guard assigned to the true if-branch.  ... 
doi:10.1145/2338965.2336784 dblp:conf/issta/SuiYX12 fatcat:xmlghfbnlzawnk4dbss6pei64y

Toward Intelligent Software Defect Detection - Learning Software Defects by Example

Markland J. Benson
2011 2011 IEEE 34th Software Engineering Workshop  
data with granularity limited to that of a particular function rather than a line of code.  ...  Source code level software defect detection has gone from state of the art to a software engineering best practice.  ...  ACKNOWLEDGMENT The author would like to thank the management of the NASA GSFC Space Network, Ground Software Systems Branch, and White Sands Complex as well as his West Virginia  ... 
doi:10.1109/sew.2011.26 dblp:conf/sew/Benson11 fatcat:24zmwlmnsfgcfmac4qnodmmqse

Andromeda: Accurate and Scalable Security Analysis of Web Applications [chapter]

Omer Tripp, Marco Pistoia, Patrick Cousot, Radhia Cousot, Salvatore Guarnieri
2013 Lecture Notes in Computer Science  
The key observation informing our approach is that taint analysis is a demand-driven problem, which enables lazy computation of vulnerable information flows, instead of eagerly computing a complete data-flow  ...  Static taint analysis enables deep and exhaustive tracking of suspicious data flows for detection of potential leakage and integrity violations, such as cross-site scripting (XSS), SQL injection (SQLi)  ...  Our experimental evaluation of ANDROMEDA, comparing it to a state-of-the-art scanner that sacrifices soundness for accuracy, shows ANDROMEDA to be favorable.  ... 
doi:10.1007/978-3-642-37057-1_15 fatcat:vzvyutcwwreaviyips3rd4zlsm

Verifying dereference safety via expanding-scope analysis

Alexey Loginov, Eran Yahav, Satish Chandra, Stephen Fink, Noam Rinetzky, Mangala Nanda
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
We present a staged expanding-scope algorithm for interprocedural abstract interpretation, which invokes sound analysis with partial programs of increasing scope.  ...  We provide an automatic approach to this problem based on a sound interprocedural analysis.  ...  The numbers exclude all library code used by the applications. Table 5 : 5 Number of warnings generated with access-path length limited to 2, and interprocedural scope limited to 2.  ... 
doi:10.1145/1390630.1390657 dblp:conf/issta/LoginovYCFRN08 fatcat:a4ty3gkgkbfhjgkyoh2hfgafsq

PyART: Python API Recommendation in Real-Time [article]

Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu
2021 arXiv   pre-print
It extracts three kinds of features: data-flow, token similarity, and token co-occurrence, in the context of the program point where a recommendation is solicited.  ...  It features a light-weight analysis to derives so-called optimistic data-flow, which is neither sound nor complete, but simulates the local data-flow information humans can derive.  ...  ACKNOWLEDGMENT We thank the anonymous reviewers for their constructive comments.  ... 
arXiv:2102.04706v1 fatcat:dksfmjvnmranjfhvdp333mgsiy

Failure sketching

Baris Kasikci, Benjamin Schubert, Cristiano Pereira, Gilles Pokam, George Candea
2015 Proceedings of the 25th Symposium on Operating Systems Principles - SOSP '15  
Developers spend a lot of time searching for the root causes of software failures.  ...  We built Gist, a prototype for failure sketching that relies on hardware watchpoints and a new hardware feature for extracting control flow traces (Intel Processor Trace).  ...  We thank Andi Kleen for providing the initial version of the Intel PT driver.  ... 
doi:10.1145/2815400.2815412 dblp:conf/sosp/KasikciSPPC15 fatcat:cuxeo6ob3rghlaxfl35la4vly4

Proving memory safety of floating-point computations by combining static and dynamic program analysis

Patrice Godefroid, Johannes Kinder
2010 Proceedings of the 19th international symposium on Software testing and analysis - ISSTA '10  
Our approach combines (1) a lightweight local path-insensitive "may" static analysis of FP instructions with (2) a high-precision wholeprogram path-sensitive "must" dynamic analysis of non-FP instructions  ...  For a given test suite of diverse input files, our mixed static/dynamic analysis is able to prove memory safety of FP code in those parsers for a small upfront static analysis cost and a marginal runtime  ...  We have implemented a flow insensitive interprocedural analysis for determining both sets.  ... 
doi:10.1145/1831708.1831710 dblp:conf/issta/GodefroidK10 fatcat:ybti5smnmnas7ifczdlafm3c5e

GPU ray tracing

Steven G. Parker, Greg Humphreys, Morgan McGuire, Martin Stich, Heiko Friedrich, David Luebke, Keith Morley, James Bigler, Jared Hoberock, David McAllister, Austin Robison, Andreas Dietrich
2013 Communications of the ACM  
For ease of use it exposes a single-ray programming model with full support for recursion and a dynamic dispatch mechanism similar to virtual function calls.  ...  Consequently, the core of OptiX is a domain-specific justin-time compiler that generates custom ray tracing kernels by combining user-supplied programs for ray generation, material shading, object intersection  ...  Multiplying the color of the light source hit by the last ray in the path yields the final sample contribution.  ... 
doi:10.1145/2447976.2447997 fatcat:fljznpvxmfbsfbqly2slgpcxdm
« Previous Showing results 1 — 15 out of 115 results