메뉴 건너뛰기




Volumn 4134 LNCS, Issue , 2006, Pages 182-203

Beyond reachability: Shape abstraction in the presence of pointer arithmetic

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; DIGITAL ARITHMETIC; FORMAL LOGIC; MATHEMATICAL MODELS; MATHEMATICAL OPERATORS; RANDOM ACCESS STORAGE;

EID: 33749853720     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11823230_13     Document Type: Conference Paper
Times cited : (48)

References (33)
  • 1
    • 24144470812 scopus 로고    scopus 로고
    • Shape analysis by predicate abstraction
    • I. Balaban, A; Pnueli, and L. Zuck. Shape analysis by predicate abstraction. 6th VMCAI, pp164-180, 2005.
    • (2005) 6th VMCAI , pp. 164-180
    • Balaban, I.1    Pnueli, A.2    Zuck, L.3
  • 2
    • 38349069881 scopus 로고    scopus 로고
    • Recency-abstraction for heap-allocated storage
    • this volume
    • G. Balakrishnan and T. Reps. Recency-abstraction for heap-allocated storage. 13th SAS (this volume), 2006.
    • (2006) 13th SAS
    • Balakrishnan, G.1    Reps, T.2
  • 3
    • 33646807486 scopus 로고    scopus 로고
    • Symbolic execution with separation logic
    • K. Yi, editor, APLAS 2005
    • J. Berdine, C. Calcagno, and P.W. O'Hearn. Symbolic execution with separation logic. In K. Yi, editor, APLAS 2005, volume 3780 of LNCS, 2005.
    • (2005) LNCS , vol.3780
    • Berdine, J.1    Calcagno, C.2    O'Hearn, P.W.3
  • 4
  • 5
    • 70350303120 scopus 로고    scopus 로고
    • Automatic termination proofs for programs with shape-shifting heaps
    • to appear
    • J. Berdine, B. Cook, D. Distefano, and P. O'Hearn. Automatic termination proofs for programs with shape-shifting heaps. 18th CAV, to appear, 2006.
    • (2006) 18th CAV
    • Berdine, J.1    Cook, B.2    Distefano, D.3    O'Hearn, P.4
  • 6
    • 24644492502 scopus 로고    scopus 로고
    • Verifying programs with dynamic 1-selector-linked structures in regular model checking
    • A. Bouajjani, P. Habermehl, P. Moro, and T. Vojnar. Verifying programs with dynamic 1-selector-linked structures in regular model checking, 11th TACAS, pp13-29, 2005.
    • (2005) 11th TACAS , pp. 13-29
    • Bouajjani, A.1    Habermehl, P.2    Moro, P.3    Vojnar, T.4
  • 7
    • 0025444591 scopus 로고
    • Analysis of pointers and structures
    • D. Chase, M. Wegman, and F. Zadeck. Analysis of pointers and structures. PLDI, pp296-310, 1990.
    • (1990) PLDI , pp. 296-310
    • Chase, D.1    Wegman, M.2    Zadeck, F.3
  • 8
    • 0346348566 scopus 로고
    • Multiword list items
    • W.T. Comfort. Multiword list items. CACM 7(6), pp357-362, 1964.
    • (1964) CACM , vol.7 , Issue.6 , pp. 357-362
    • Comfort, W.T.1
  • 9
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. 4th POPL, pp238-252, 1977.
    • (1977) 4th POPL , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 10
    • 0018294932 scopus 로고
    • Systematic design of program analysis frameworks
    • P. Cousot and R. Cousot. Systematic design of program analysis frameworks. 6th POPL, pp269-282, 1979.
    • (1979) 6th POPL , pp. 269-282
    • Cousot, P.1    Cousot, R.2
  • 11
    • 0000963996 scopus 로고
    • Abstract interpretation frameworks
    • P. Cousot and R. Cousot. Abstract interpretation frameworks. J. Log. Comput. 2(4), pp511-547, 1992.
    • (1992) J. Log. Comput. , vol.2 , Issue.4 , pp. 511-547
    • Cousot, P.1    Cousot, R.2
  • 13
    • 85035003357 scopus 로고
    • Automatic discovery of linear restraints among variables of a program
    • P. Cousot and N. Halbwachs. Automatic discovery of linear restraints among variables of a program. 5th POPL, pp84-96, 1978.
    • (1978) 5th POPL , pp. 84-96
    • Cousot, P.1    Halbwachs, N.2
  • 14
    • 35048816889 scopus 로고    scopus 로고
    • Who is pointing when to whom? on the automated verification of linked list structures
    • D. Distefano, J.-P. Katoen, and A. Rensink. Who is pointing when to whom? On the automated verification of linked list structures. 24th FSTTCS, pp250-262, 2004.
    • (2004) 24th FSTTCS , pp. 250-262
    • Distefano, D.1    Katoen, J.-P.2    Rensink, A.3
  • 15
    • 33745765468 scopus 로고    scopus 로고
    • A local shape analysis based on separation logic
    • D. Distefano, P. O'Hearn, and H. Yang. A local shape analysis based on separation logic. 16th TACAS, pp287-302, 2006.
    • (2006) 16th TACAS , pp. 287-302
    • Distefano, D.1    O'Hearn, P.2    Yang, H.3
  • 16
    • 1442337851 scopus 로고    scopus 로고
    • Towards a realistic tool for statically detecting all buffer overflows in C
    • N. Dor, M. Rodeh, and M. Sagiv. Towards a realistic tool for statically detecting all buffer overflows in C. PLDI, pp155-167, 2003.
    • (2003) PLDI , pp. 155-167
    • Dor, N.1    Rodeh, M.2    Sagiv, M.3
  • 18
    • 33749847560 scopus 로고    scopus 로고
    • Interprocedural shape analysis with separated heap abstractions
    • to appear
    • A. Gotsman, J. Berdine, and B. Cook. Interprocedural shape analysis with separated heap abstractions. 13th SAS, to appear, 2006.
    • (2006) 13th SAS
    • Gotsman, A.1    Berdine, J.2    Cook, B.3
  • 21
    • 24644443912 scopus 로고    scopus 로고
    • Automatic verification of pointer programs using grammar-based shape analysis
    • O. Lee, H. Yang, and K. Yi. Automatic verification of pointer programs using grammar-based shape analysis. 14th ESOP, pp124-140, 2005.
    • (2005) 14th ESOP , pp. 124-140
    • Lee, O.1    Yang, H.2    Yi, K.3
  • 22
    • 34547463929 scopus 로고    scopus 로고
    • Inferring invariants in Separation Logic for imperative list-processing programs
    • S. Magill, A. Nanevski, E. Clarke, and P. Lee. Inferring invariants in Separation Logic for imperative list-processing programs. 3rd SPACE Workshop, 2006.
    • (2006) 3rd SPACE Workshop
    • Magill, S.1    Nanevski, A.2    Clarke, E.3    Lee, P.4
  • 24
    • 24144463825 scopus 로고    scopus 로고
    • Predicate abstraction and canonical abstraction for singly-linked lists
    • R. Manevich, E. Yahav, G. Ramalingam, and M. Sagiv. Predicate abstraction and canonical abstraction for singly-linked lists. 6th VMCAI, pp181-198, 2005.
    • (2005) 6th VMCAI , pp. 181-198
    • Manevich, R.1    Yahav, E.2    Ramalingam, G.3    Sagiv, M.4
  • 25
    • 33749828657 scopus 로고    scopus 로고
    • Verification of the heap manager of an operating system using separation logic
    • N. Marti, R. Affeldt, and A. Yonezawa. Verification of the heap manager of an operating system using separation logic. 3rd SPACE Workshop, 2006.
    • (2006) 3rd SPACE Workshop
    • Marti, N.1    Affeldt, R.2    Yonezawa, A.3
  • 26
    • 34250686292 scopus 로고    scopus 로고
    • Intermediate-representation recovery from low-level code
    • T. Reps, G. Balakrishnan, and J. Lim. Intermediate-representation recovery from low-level code. PEPM'06, ppl00-111, 2006.
    • (2006) PEPM'06
    • Reps, T.1    Balakrishnan, G.2    Lim, J.3
  • 27
    • 0036051192 scopus 로고    scopus 로고
    • Separation logic: A logic for shared mutable data structures
    • J. C. Reynolds. Separation logic: A logic for shared mutable data structures. In 17th LICS, pp 55-74, 2002.
    • (2002) 17th LICS , pp. 55-74
    • Reynolds, J.C.1
  • 28
    • 33749851344 scopus 로고    scopus 로고
    • Personal communication
    • Xavier Rival. Personal communication. 2005.
    • (2005)
    • Rival, X.1
  • 29
    • 27844444121 scopus 로고    scopus 로고
    • Symbolic bounds analysis of pointers, array indices, and accessed memory regions
    • R. Rugina and M. Rinard. Symbolic bounds analysis of pointers, array indices, and accessed memory regions. ACM TOPLAS, 27(2):185-235, 2005.
    • (2005) ACM TOPLAS , vol.27 , Issue.2 , pp. 185-235
    • Rugina, R.1    Rinard, M.2
  • 30
    • 0031598986 scopus 로고    scopus 로고
    • Solving shape-analysis problems in languages with destructive updating
    • M. Sagiv, T. Reps, and R. Wilhelm. Solving shape-analysis problems in languages with destructive updating. ACM TOPLAS, 20(1):1-50, 1998.
    • (1998) ACM TOPLAS , vol.20 , Issue.1 , pp. 1-50
    • Sagiv, M.1    Reps, T.2    Wilhelm, R.3
  • 31
    • 0039488517 scopus 로고    scopus 로고
    • Parametric shape analysis via 3valued logic
    • M. Sagiv, T. Reps, and R. Wilhelm. Parametric shape analysis via 3valued logic. ACM TOPLAS, 24(3):217-298, 2002.
    • (2002) ACM TOPLAS , vol.24 , Issue.3 , pp. 217-298
    • Sagiv, M.1    Reps, T.2    Wilhelm, R.3
  • 32
    • 85081874807 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. Proceedings of NDSS, 2000.
    • (2000) Proceedings of NDSS
    • Wagner, D.1    Foster, J.2    Brewer, E.3    Aiken, A.4
  • 33
    • 33749859555 scopus 로고    scopus 로고
    • Building certified libraries for PCC: Dynamic storage allocation
    • D. Yu, N. A. Hamid, and Z. Shao. Building certified libraries for PCC: Dynamic storage allocation. 12th ESOP, pp363-379, 2003.
    • (2003) 12th ESOP , pp. 363-379
    • Yu, D.1    Hamid, N.A.2    Shao, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.