Sound and effective data-flow analysis in the presence of aliasing

作者: Omer Tripp , Salvatore A. Guarnieri , Marco Pistoia , Julian Dolby

DOI:

关键词:

摘要: A method is disclosed that includes, using a data flow model of program suitable for taint analysis the program, tracking information from sources to entities in heap based on program. The performed so relevant propagation and manner field-sensitive heap. output tracking, performing data-flow determine through paths sinks taint.

参考文章(16)
V. Benjamin Livshits, Monica S. Lam, Finding security vulnerabilities in java applications with static analysis usenix security symposium. pp. 18- 18 ,(2005)
Julian Dolby, Satish Chandra, Manu Sridharan, Frank Tip, Scalable property-sensitive points-to analysis for program code ,(2011)
Satish Chandra, Emina Torlak, Systems and methods for resource leak detection ,(2009)
Brian Chess, Arthur Do, Sean Fay, Roger Thornton, Apparatus and method for testing secure software ,(2004)
Ben-Chung Cheng, Wen-Mei W. Hwu, Modular interprocedural pointer analysis using access paths Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation - PLDI '00. ,vol. 35, pp. 57- 69 ,(2000) , 10.1145/349299.349311
Marc Berndl, Ondrej Lhoták, Feng Qian, Laurie Hendren, Navindra Umanee, Points-to analysis using BDDs programming language design and implementation. ,vol. 38, pp. 103- 114 ,(2003) , 10.1145/780822.781144
Thomas Reps, Susan Horwitz, Mooly Sagiv, Precise interprocedural dataflow analysis via graph reachability Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '95. pp. 49- 61 ,(1995) , 10.1145/199448.199462