Filters








344 Hits in 4.3 sec

Flow-Sensitive Type-Based Heap Cloning (Artifact)

Mohamad Barbar, Yulei Sui, Shiping Chen, Manuel Rigger, Lisa Nguyen Quang Do
2020 Dagstuhl Artifacts Series (DARTS)  
This artifact contains our implementation of a new flow-sensitive type-based points-to analysis, described in "Flow-Sensitive Type-Based Heap Cloning" by Mohamad Barbar, Yulei Sui, and Shiping Chen (ECOOP  ...  This analysis performs heap cloning based on C and C++ types rather than calling contexts.  ...  answer over 16% and over 15% more alias queries with a "no-alias" response than Sparse (when not considering, and when considering, reuse, respectively). typeclone.tar: a Docker image with Debian as the base  ... 
doi:10.4230/darts.6.2.1 dblp:journals/darts/BarbarS020 fatcat:bb5asc7tdbfkxbt67l6guup5na

Front Matter, Table of Contents, Preface, Conference Organization

Lisa Nguyen Quang Do, Manuel Rigger
2020 Dagstuhl Artifacts Series (DARTS)  
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 0:xi-0:xii Artifacts Flow-Sensitive Type-Based Heap Cloning (Artifact)MohamadBarbar, Yulei Sui  ...  In particular, the process was based on the artifact evaluation guidelines by Shriram Krishnamurthi, Matthias Hauswirth, Steve Blackburn, and Jan Vitek published on the Artifact Evaluation site. 1 In addition  ...  Artifact Evaluation Process Artifact Evaluation Committee  ... 
doi:10.4230/darts.6.2.0 dblp:journals/darts/DoR20 fatcat:brwmp6hsxzbb3bf3syo32y6goq

TAJ

Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu Sridharan, Omri Weisman
2009 SIGPLAN notices  
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations.  ...  Specifically, an industrial-strength tool must scale to large industrial Web applications, model essential Web-application code artifacts, and generate consumable reports for a wide range of attack vectors  ...  Myers' Java Information Flow (Jif) [24] uses type-based static analysis to track information flow.  ... 
doi:10.1145/1543135.1542486 fatcat:e2y5fajbyrekxbyri67ueqrjem

TAJ

Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu Sridharan, Omri Weisman
2009 Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation - PLDI '09  
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations.  ...  Specifically, an industrial-strength tool must scale to large industrial Web applications, model essential Web-application code artifacts, and generate consumable reports for a wide range of attack vectors  ...  Myers' Java Information Flow (Jif) [24] uses type-based static analysis to track information flow.  ... 
doi:10.1145/1542476.1542486 dblp:conf/pldi/TrippPFSW09 fatcat:oeltvagp4zet3d25jucohtcoye

Alias Analysis for Object-Oriented Programs [chapter]

Manu Sridharan, Satish Chandra, Julian Dolby, Stephen J. Fink, Eran Yahav
2013 Lecture Notes in Computer Science  
We then describe flow-sensitive techniques based on tracking of access paths, which can yield greater precision for certain clients.  ...  We present a high-level survey of state-of-the-art alias analyses for object-oriented programs, based on a years-long effort developing industrial-strength static analyses for Java.  ...  For this policy, a cloning-based analysis would clone each method for each possible call site, and compute a separate solution for each clone.  ... 
doi:10.1007/978-3-642-36946-9_8 fatcat:f4v62o24r5dztec7h7exgfle2y

Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization [article]

Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida
2021 arXiv   pre-print
To address this challenge, Constantine relies on carefully designed optimizations such as just-in-time loop linearization and aggressive function cloning for fully context-sensitive points-to analysis,  ...  In this paper, we present Constantine, a compiler-based system to automatically harden programs against microarchitectural side channels.  ...  Aggressive Cloning. We use function cloning to turn a contextinsensitive analysis in a context-sensitive one.  ... 
arXiv:2104.10749v1 fatcat:sgzyxvxspjghtndhznupii2oia

Effects of Program Representation on Pointer Analyses — An Empirical Study [chapter]

Jyoti Prakash, Abhishek Tiwari, Christian Hammer
2021 Lecture Notes in Computer Science  
These frameworks vary on heap abstraction, modeling library classes, and underlying intermediate program representation (IR).  ...  A context-sensitive heap abstraction (a.k.a heap cloning) discerns the abstract 3 heap-objects based on the calling context, associating the calling context with the heap object to distinguish the allocations  ...  -We empirically found differences in heap abstractions even for analyses claiming the same levels of context-sensitivity regarding the types of heap objects.  ... 
doi:10.1007/978-3-030-71500-7_12 fatcat:um354wbyizggxatkrp66euqavy

Thin slicing

Manu Sridharan, Stephen J. Fink, Rastislav Bodik
2007 SIGPLAN notices  
Traditional slices must include the transitive flow dependences of the seed. Thin slices ignore base pointer flow dependences, thereby excluding statements explaining heap-based value flow.  ...  Hence, these lines are explainers for the heap-based value flow between lines 5 and 7 in the thin slice.  ... 
doi:10.1145/1273442.1250748 fatcat:7f2vqgncqvhtrie6tbcqradv3y

A Topic Modeling Approach for Code Clone Detection

Sandeep Reddivari, Mohammed Salman Khan
2018 Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering  
These clones based on their similarities are categorized as textual (type I, II, III) and functional (type IV).  ...  Code Clone Types [56] Refers to the types of cloning and there are four types of code clones: Type I, Type II, Type III, and the Type IV.  ... 
doi:10.18293/seke2018-179 dblp:conf/seke/ReddivariK18 fatcat:dwqcyp4e5fdcbjmekylbl5oaky

The Generalized PatchMatch Correspondence Algorithm [chapter]

Connelly Barnes, Eli Shechtman, Dan B. Goldman, Adam Finkelstein
2010 Lecture Notes in Computer Science  
We explore a variety of vision applications: denoising, finding forgeries by detecting cloned regions, symmetry detection, and object detection.  ...  However, the area of the clone is not exactly that of the removed objects because our prototype is not robust to noise, compression artifacts, or feathering.  ...  Like most optical flow methods, SIFT Flow assumes locality and smoothness of the flow and thus can fail to align objects under large displacements.  ... 
doi:10.1007/978-3-642-15558-1_3 fatcat:7h6dsa7havf6fjefyukze2wvvu

Front Matter, Table of Contents, Preface, Conference Organization

Robert Hirschfeld, Tobias Pape
2020 European Conference on Object-Oriented Programming  
Type-Based Heap Cloning Mohamad Barbar, Yulei Sui, and Shiping Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24:1-24:26 Scala with Explicit Nulls Abel Nieto, Yaoyu Zhao,  ...  11:1-11:26 A Semantics for the Essence of React Magnus Madsen, Test-Case Reduction via Test-Case Generation: Insights from the Hypothesis Reducer (Tool Insights Paper) David R. . . 23:1-23:30 Flow-Sensitive  ... 
doi:10.4230/lipics.ecoop.2020.0 dblp:conf/ecoop/X19a fatcat:amf4qxktj5bwla224edl24to7a

An evaluation of automatic object inline allocation techniques

Julian Dolby, Andrew A. Chien
1998 Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '98  
These analyses span a range from local data flow to adaptive whole-program, flow-sensitive inter-procedural analysis.  ...  We present three compiler analyses to identify inlinable fields by tracking accesses to heap objects.  ...  to base number of object allocations Overall dvnamic effects runtime memory usage code size time relative to base program runtime bytes relative to base total heap allocation bytes relative to base executable  ... 
doi:10.1145/286936.286943 dblp:conf/oopsla/DolbyC98 fatcat:igxvlz3ytne47nud32xrddae2i

An evaluation of automatic object inline allocation techniques

Julian Dolby, Andrew A. Chien
1998 SIGPLAN notices  
These analyses span a range from local data flow to adaptive whole-program, flow-sensitive inter-procedural analysis.  ...  We present three compiler analyses to identify inlinable fields by tracking accesses to heap objects.  ...  to base number of object allocations Overall dvnamic effects runtime memory usage code size time relative to base program runtime bytes relative to base total heap allocation bytes relative to base executable  ... 
doi:10.1145/286942.286943 fatcat:xhqu6m2cnbemjazxyjjozzyvci

Detecting sensitive data disclosure via bi-directional text correlation analysis

Jianjun Huang, Xiangyu Zhang, Lin Tan
2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016  
The type system features a novel bi-directional propagation technique that propagates the variable label sets through forward and backward data-flow.  ...  It reports 4,406 apps that have sensitive data disclosures, with 4,263 apps having log based disclosures and 1,688 having disclosures due to other sinks such as HTTP requests.  ...  Git LFS [2] is required to clone the repository.  ... 
doi:10.1145/2950290.2950348 dblp:conf/sigsoft/HuangZT16 fatcat:q2epwts6cjhozgaloxikb4wv2q

Low-latency time-portable real-time programming with Exotasks

Joshua Auerbach, David F. Bacon, Daniel Iercan, Christoph M. Kirsch, V. T. Rajan, Harald Röck, Rainer Trummer
2009 ACM Transactions on Embedded Computing Systems  
To achieve these goals, the program is divided into tasks with private heaps.  ...  In the absence of anything else, the graphs express only data-flow information, which is strongly typed.  ...  The data type flowing to and from the controlState communicator is of type JControlAlgorithm and contains data and methods relating to the overall control state.  ... 
doi:10.1145/1457255.1457262 fatcat:4656vplfn5cvbdlayhytcn4awi
« Previous Showing results 1 — 15 out of 344 results