Filters








19,143 Hits in 7.3 sec

Interprocedural static analysis of sequencing constraints

Kurt M. Olender, Leon J. Osterweil
1992 ACM Transactions on Software Engineering and Methodology  
Finally, we sketch the architecture of our prototype analysis system (called Cesar) and describe our experiences to date with its use, citing performance and error detection characteristics. a solution  ...  This paper describes a system that automatically performs static interprocedural sequencing analysis from programmable constraint specifications.  ...  CESAR: A STATIC SEQUENCING EVALUATION SYSTEM Cesar is an experimental implementation of the static interprocedural se- quencing analysis algorithm described in Section 3.  ... 
doi:10.1145/125489.122822 fatcat:psitpump3rbu7c7fycjfnaknbm

Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques

Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk
2021 ACM Transactions on Privacy and Security  
However, existing tools, and specifically, static analysis tools, trade soundness of the analysis for precision and performance and are hence sound y .  ...  We implemented μSE and applied it to a set of prominent Android static analysis tools that detect private data leaks in apps.  ...  ACKNOWLEDGMENTS We thank the developers of the evaluated tools for making their tools available to the community, and for being open to suggestions.  ... 
doi:10.1145/3439802 fatcat:jij564rmn5akhdpqdk5pzdempi

MPro: Combining Static and Symbolic Analysis for Scalable Testing of Smart Contract [article]

William Zhang, Sebastian Banescu, Leodardo Pasos, Steven Stewart, Vijay Ganesh
2019 arXiv   pre-print
A significant advantage of combining symbolic with static analysis is that it scales much better than symbolic alone and does not have the problem of false positive that static analysis tools typically  ...  In this paper, we present a technique to analyze depth-n vulnerabilities in an efficient and scalable way by combining symbolic execution and data dependency analysis.  ...  Zeus [18] is a sound and scalable framework for automated formal verification of smart contracts based on abstract interpretation and model checking.  ... 
arXiv:1911.00570v1 fatcat:bpgx6qfoirfm3lxqbrsayh5g7y

A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis

2020 KSII Transactions on Internet and Information Systems  
reviews using a static analysis.  ...  Our static analysis tool can effectively inspect reliability, maintainability, and security violations. The results of the automatic code review indicate the common violations among SmartApps.  ...  CodeNarc uses abstract syntax tree (AST) traversal for static analysis to examine the code structure and to check violations without running the program.  ... 
doi:10.3837/tiis.2020.06.003 fatcat:lmizczy4g5bsffayenwdzhrsuq

Mining Hardware Assertions With Guidance From Static Analysis

S. Hertz, D. Sheridan, S. Vasudevan
2013 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Our method involves a combination of data mining and static analysis of the Register Transfer Level (RTL) design.  ...  They can be used in a regression test suite of an evolving RTL.  ...  Static analysis can make excellent generalizations and abstractions, but its algorithms are limited by computational capacity.  ... 
doi:10.1109/tcad.2013.2241176 fatcat:ter7nec5eneh7dycxldysdmcsu

eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts [article]

Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei
2020 arXiv   pre-print
An automated security analysis of these contracts is thus of utmost interest, but at the same time technically challenging for a variety of reasons, such as the specific transaction-oriented programming  ...  In this work, we present eThor, the first sound and automated static analyzer for EVM bytecode, which is based on an abstraction of the EVM bytecode semantics based on Horn clauses.  ...  Figure 13 shows an excerpt of the HoRStspecification of the presented static analysis. The abstract domain of the analysis is realized by the definition of the abstract datatype AbsDom.  ... 
arXiv:2005.06227v1 fatcat:fyo2hk6uzbd3rjkhlwno3osa4m

Static analysis of the worst-case memory performance for irregular codes with indirections

Diego Andrade, Basilio B. Fraguela, Ramón Doallo
2012 ACM Transactions on Architecture and Code Optimization (TACO)  
Static Analysis of the worst-case memory performance for irregular codes with indirections. ACM Trans.  ...  In fact, in all our experiments the number of misses was below the soft boundary predicted by the model.  ...  We also want to acknowledge the Centro de Supercomputación de Galicia (CESGA) for the use of its computers.  ... 
doi:10.1145/2355585.2355593 fatcat:q7dojf3qgjgbhisnmpk4pnhjzy

Approximating happens-before order: interplay between static analysis and state space traversal

Pavel Parízek, Pavel Jančík
2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software - SPIN 2014  
Results of experiments with several Java programs show that usage of the may-happenbefore analysis further improves the performance of JPF.  ...  The may-happen-before analysis combines static analysis with knowledge of information available from the dynamic program state.  ...  [11] uses static analysis together with abstract interpretation to eliminate redundant thread interleavings.  ... 
doi:10.1145/2632362.2632365 dblp:conf/spin/ParizekJ14 fatcat:b3zt67sotbhybghi2sisd2yyv4

Static analysis of role-based access control in J2EE applications

Gleb Naumovich, Paolina Centonze
2004 Software engineering notes  
This work describes a new technique for analysis of Java 2, Enterprise Edition (J2EE) applications.  ...  We present a static technique for analyzing J2EE access control policies with respect to security-sensitive fields of EJBs and other server-side objects.  ...  Therefore, our approach is orthogonal to an analysis into secure usage of the run-as mechanism.  ... 
doi:10.1145/1022494.1022530 fatcat:er52ijcbp5cndlswtmn2gffe5u

Towards a dynamic theory of transactions

Bart Nooteboom
1992 Journal of evolutionary economics  
Standard transaction cost economics (TCE) considers transactions from the perspective of static efficiency.  ...  Since innovation is dependent on knowledge and learning, the step from the statics to the dynamics of exchange requires an understanding of the development and acquisition of knowledge, preferences, and  ...  Dynamic analysis The purpose of the present paper is to offer an exploration in dynamic analysis, aimed at developing TCE into a more general transaction cost theory (TCT).  ... 
doi:10.1007/bf01200127 fatcat:tnxgitdkfrhdrdlep7qimivx7m

Detection of concurrency errors in multithreaded applications based on static source code analysis

D. Giebas, R. Wojszczyk
2021 IEEE Access  
Such an approach allows e.g. to transform the source code into a form of Abstract Syntax Tree, which can be subject to further analysis.  ...  in the process of static code analysis.  ... 
doi:10.1109/access.2021.3073859 fatcat:hqefredsm5dktiwn7x3wmytqaa

Model checking of concurrent programs with static analysis of field accesses

Pavel Parízek, Ondřej Lhoták
2015 Science of Computer Programming  
Results of experiments on several Java programs show that the static analyses greatly improve the performance and scalability of JPF.  ...  We propose static analyses that identify globally-relevant field accesses more precisely.  ...  Acknowledgements This work was partially supported by the Grant Agency of the Czech Republic project 13-12121P, and partially supported by the Natural Sciences and Engineering Research Council of Canada  ... 
doi:10.1016/j.scico.2014.10.008 fatcat:m23h2ps3nndxhcr3hkkfu2k3ju

Analysis of quasi-static scheduling techniques in a virtualized reconfigurable machine

Yury Markovskiy, Eylon Caspi, Randy Huang, Joseph Yeh, Michael Chu, John Wawrzynek, André DeHon
2002 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays - FPGA '02  
This strategy reduces online scheduling work per reconfiguration epoch by an order of magnitude.  ...  A key component of this strategy is an automatic scheduler that selects the temporal sequencing of virtual resources onto the physical device.  ...  Both use the fixed time-slice model, with identical time-slices (250,000 cycles), but the static scheduler gains an edge from its global rather than greedy analysis.  ... 
doi:10.1145/503074.503077 fatcat:adijrjtgtbhe3crc6a3kffvkzu

Analysis of quasi-static scheduling techniques in a virtualized reconfigurable machine

Yury Markovskiy, Eylon Caspi, Randy Huang, Joseph Yeh, Michael Chu, John Wawrzynek, André DeHon
2002 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays - FPGA '02  
This strategy reduces online scheduling work per reconfiguration epoch by an order of magnitude.  ...  A key component of this strategy is an automatic scheduler that selects the temporal sequencing of virtual resources onto the physical device.  ...  Both use the fixed time-slice model, with identical time-slices (250,000 cycles), but the static scheduler gains an edge from its global rather than greedy analysis.  ... 
doi:10.1145/503048.503077 dblp:conf/fpga/MarkovskiyCHYCWD02 fatcat:ef5vtzgprzbb5bkwo4uctqvff4

Transactional data structure libraries

Alexander Spiegelman, Guy Golan-Gueta, Idit Keidar
2016 SIGPLAN notices  
Our library offers efficient and scalable transactions, which are an order of magnitude faster than state-of-theart transactional memory toolkits.  ...  We introduce transactions into libraries of concurrent data structures; such transactions can be used to ensure atomicity of sequences of data structure operations.  ...  Acknowledgments We thank Edward Bortnikov for many helpful discussions and Tomer Morad for assistance with running the experiments.  ... 
doi:10.1145/2980983.2908112 fatcat:pfc57phlmbcklnrbwihvdhprzy
« Previous Showing results 1 — 15 out of 19,143 results