Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2156802guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
SAS'05: Proceedings of the 12th international conference on Static Analysis
2005 Proceeding
  • Editors:
  • Chris Hankin,
  • Igor Siveroni
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
London UK September 7 - 9, 2005
ISBN:
978-3-540-28584-7
Published:
07 September 2005

Reflects downloads up to 05 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SECTION: Invited talks
Article
Algorithmic game semantics and static analysis

Game Semantics has been developed over the past 12 years or so as a dist inctive approach to the semantics of programming language. It is composit ional in the tradition of denotational semantics, and has led to the cons truction of fully abstract ...

Article
From typed process calculi to source-based security

The source-based security problem is to build tools to check security properties of the actual source code of a system, as opposed to some abstract model. Static analysis of C for buffer overruns is one approach. Another is to introduce security types ...

SECTION: Contributed papers
Article
Widening operators for weakly-relational numeric abstractions

We discuss the construction of proper widening operators on several weakly-relational numeric abstractions. Our proposal differs from previous ones in that we actually consider the semantic abstract domains, whose elements are geometric shapes, instead ...

Article
Generation of basic semi-algebraic invariants using convex polyhedra

A technique for generating invariant polynomial inequalities of bounded degree is presented using the abstract interpretation framework. It is based on overapproximating basic semi-algebraic sets, i.e., sets defined by conjunctions of polynomial ...

Article
Inference of well-typings for logic programs with application to termination analysis

A method is developed to infer a polymorphic well-typing for a logic program. Our motivation is to improve the automation of termination analysis by deriving types from which norms can automatically be constructed. Previous work on type-based ...

Article
Memory space conscious loop iteration duplication for reliable execution

Soft errors, a form of transient errors that cause bit flips in memory and other hardware components, are a growing concern for embedded systems as technology scales down. While hardware-based approaches to detect/correct soft errors are important, ...

Article
Memory usage verification for OO programs

We present a new type system for an object-oriented (OO) language that characterizes the sizes of data structures and the amount of heap memory required to successfully execute methods that operate on these data structures. Key components of this type ...

Article
Abstraction refinement for termination

Abstraction can often lead to spurious counterexamples. Counterexample-guided abstraction refinement is a method of strengthening abstractions based on the analysis of these spurious counterexamples. For invariance properties, a counterexample is a ...

Article
Data-abstraction refinement: a game semantic approach

This paper presents a semantic framework for data abstraction and refinement for verifying safety properties of open programs. The presentation is focused on an Algol-like programming language that incorporates data abstraction in its syntax. The fully ...

Article
Locality-based abstractions

We present locality-based abstractions, in which a set of states of a distributed system is abstracted to the collection of views that some observers have of the states. Special cases of locality-abstractions have been used in different contexts (...

Article
Type-safe optimisation of plugin architectures

Programmers increasingly implement plugin architectures in type-safe object-oriented languages such as Java. A virtual machine can dynamically load class files containing plugins, and a JIT compiler can do optimisations such as method inlining. Until ...

Article
Using dependent types to certify the safety of assembly code

There are many source-level analyses or instrumentation tools that enforce various safety properties. In this paper we present an infrastructure that can be used to check independently that the assembly output of such tools has the desired safety ...

Article
The PER model of abstract non-interference

In this paper, we study the relationship between two models of secure information flow: the PER model (which uses equivalence relations) and the abstract non-interference model (which uses upper closure operators). We embed the lattice of equivalence ...

Article
A relational abstraction for functions

This paper concerns the abstraction of sets of functions for use in abstract interpretation. The paper gives an overview of existing methods, which are illustrated with applications to shape analysis, and formalizes a new family of relational abstract ...

Article
Taming false alarms from a domain-unaware c analyzer by a bayesian statistical post analysis

We present our experience of combining, in a realistic setting, a static analyzer with a statistical analysis. This combination is in order to reduce the inevitable false alarms from a domain-unaware static analyzer. Our analyzer named Airac(Array Index ...

Article
Banshee: a scalable constraint-based analysis toolkit

We introduce Banshee, a toolkit for constructing constraint-based analyses. Banshee's novel features include a code generator for creating customized constraint resolution engines, incremental analysis based on backtracking, and fast persistence. These ...

Article
A generic framework for interprocedural analysis of numerical properties

In his seminal paper [5], Granger presents an analysis which infers linear congruence relations between integer variables. For affine programs without guards, his analysis is complete, i.e., infers all such congruences. No upper complexity bound, though,...

Article
Finding basic block and variable correspondence

Having in mind the ultimate goal of translation validation for optimizing compilers, we propose a new algorithm for solving the problem of finding basic block and variable correspondence between two (low-level) programs generated by a compiler from the ...

Article
Boolean heaps

We show that the idea of predicates on heap objects can be cast in the framework of predicate abstraction. This leads to an alternative view on the underlying concepts of three-valued shape analysis by Sagiv, Reps and Wilhelm. Our construction of the ...

Article
Interprocedural shape analysis for cutpoint-free programs

We present a framework for interprocedural shape analysis, which is context- and flow-sensitive with the ability to perform destructive pointer updates. We limit our attention to cutpoint-free programs—programs in which reasoning on a procedure call ...

Article
Understanding the origin of alarms in ASTRÉE

Static analyzers like Astrée are incomplete, hence, may produce false alarms. We propose a framework for the investigation of the alarms produced by Astrée , so as to help classifying them as true errors or false alarms that are due to the approximation ...

Article
Pair-sharing analysis of object-oriented programs

Pair-sharing analysis of object-oriented programs determines those pairs of program variables bound at run-time to overlapping data structures. This information is useful for program parallelisation and analysis. We follow a similar construction for ...

Article
Exploiting sparsity in polyhedral analysis

The intrinsic cost of polyhedra has lead to research on more tractable sub-classes of linear inequalities. Rather than committing to the precision of such a sub-class, this paper presents a projection algorithm that works directly on any sparse system ...

Article
Secure information flow as a safety problem

The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the term “self-composition” to describe this reduction. This paper generalizes ...

Contributors
  • Imperial College London
  • City, University of London

Recommendations