메뉴 건너뛰기




Volumn 7791 LNCS, Issue , 2013, Pages 41-60

Efficient and effective handling of exceptions in Java points-to analysis

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT-INSENSITIVE ANALYSIS; CONTROL-FLOW; EXCEPTION ANALYSIS; JOINT ANALYSIS; LARGE AMOUNTS; LARGE SPACES; POINTS-TO ANALYSIS; REPRESENTATIVE OBJECT;

EID: 84874425349     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-37051-9_3     Document Type: Conference Paper
Times cited : (21)

References (30)
  • 3
    • 0035362869 scopus 로고    scopus 로고
    • Complexity of points-to analysis of Java in the presence of exceptions
    • Chatterjee, R., Ryder, B.G., Landi, W.A.: Complexity of points-to analysis of Java in the presence of exceptions. IEEE Trans. Softw. Eng. 27(6), 481-512 (2001)
    • (2001) IEEE Trans. Softw. Eng. , vol.27 , Issue.6 , pp. 481-512
    • Chatterjee, R.1    Ryder, B.G.2    Landi, W.A.3
  • 4
    • 0002568342 scopus 로고    scopus 로고
    • Efficient and precise modeling of exceptions for the analysis of Java programs
    • Choi, J.D., Grove, D., Hind, M., Sarkar, V.: Efficient and precise modeling of exceptions for the analysis of Java programs. SIGSOFT Softw. Eng. Notes 24(5), 21-31 (1999)
    • (1999) SIGSOFT Softw. Eng. Notes , vol.24 , Issue.5 , pp. 21-31
    • Choi, J.D.1    Grove, D.2    Hind, M.3    Sarkar, V.4
  • 8
    • 34548797103 scopus 로고    scopus 로고
    • Exception-chain analysis: Revealing exception handling architecture in Java server applications
    • IEEE Computer Society, Washington, DC
    • Fu, C., Ryder, B.G.: Exception-chain analysis: Revealing exception handling architecture in Java server applications. In: ICSE 2007: Proceedings of the 29th International Conference on Software Engineering, pp. 230-239. IEEE Computer Society, Washington, DC (2007)
    • (2007) ICSE 2007: Proceedings of the 29th International Conference on Software Engineering , pp. 230-239
    • Fu, C.1    Ryder, B.G.2
  • 10
    • 84890883068 scopus 로고    scopus 로고
    • GateKeeper: Mostly static enforcement of security and reliability policies for Javascript code
    • USENIX Association, Berkeley
    • Guarnieri, S., Livshits, B.: GateKeeper: mostly static enforcement of security and reliability policies for Javascript code. In: Proceedings of the 18th USENIX Security Symposium, SSYM 2009, pp. 151-168. USENIX Association, Berkeley (2009), http://dl.acm.org/citation.cfm?id=1855768.1855778
    • (2009) Proceedings of the 18th USENIX Security Symposium, SSYM 2009 , pp. 151-168
    • Guarnieri, S.1    Livshits, B.2
  • 11
    • 33746606933 scopus 로고    scopus 로고
    • CodeQuest: Scalable Source Code Queries with Datalog
    • Thomas, D. (ed.) ECOOP 2006. Springer, Heidelberg
    • Hajiyev, E., Verbaere, M., de Moor, O.: codeQuest: Scalable Source Code Queries with Datalog. In: Thomas, D. (ed.) ECOOP 2006. LNCS, vol. 4067, pp. 2-27. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4067 , pp. 2-27
    • Hajiyev, E.1    Verbaere, M.2    De Moor, O.3
  • 14
    • 35048891149 scopus 로고    scopus 로고
    • Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow
    • Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. Springer, Heidelberg
    • Jo, J.-W., Chang, B.-M.: Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 106-113. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3043 , pp. 106-113
    • Jo, J.-W.1    Chang, B.-M.2
  • 19
    • 35248842644 scopus 로고    scopus 로고
    • Scaling Java Points-to Analysis Using SPARK
    • Hedin, G. (ed.) CC 2003. Springer, Heidelberg
    • Lhoták, O., Hendren, L.: Scaling Java Points-to Analysis Using SPARK. In: Hedin, G. (ed.) CC 2003. LNCS, vol. 2622, pp. 153-169. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2622 , pp. 153-169
    • Lhoták, O.1    Hendren, L.2
  • 20
    • 53749104898 scopus 로고    scopus 로고
    • Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation
    • Lhoták, O., Hendren, L.: Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation. ACM Trans. Softw. Eng. Methodol. 18(1), 1-53 (2008)
    • (2008) ACM Trans. Softw. Eng. Methodol. , vol.18 , Issue.1 , pp. 1-53
    • Lhoták, O.1    Hendren, L.2
  • 21
    • 84874409313 scopus 로고    scopus 로고
    • Practical static analysis of Javascript applications in the presence of frameworks and libraries
    • Tech. Rep. MSR-TR-2012-66, Jully
    • Madsen, M., Livshits, B., Fanning, M.: Practical static analysis of Javascript applications in the presence of frameworks and libraries. Tech. Rep. MSR-TR-2012-66, Microsoft Research (Jully 2012)
    • (2012) Microsoft Research
    • Madsen, M.1    Livshits, B.2    Fanning, M.3
  • 22
  • 23
    • 13844296853 scopus 로고    scopus 로고
    • Parameterized object sensitivity for points-to analysis for Java
    • Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. ACM Trans. Softw. Eng. Methodol. 14(1), 1-41 (2005)
    • (2005) ACM Trans. Softw. Eng. Methodol. , vol.14 , Issue.1 , pp. 1-41
    • Milanova, A.1    Rountev, A.2    Ryder, B.G.3
  • 24
    • 0003638217 scopus 로고
    • Demand interprocedural program analysis using logic databases
    • Ramakrishnan, R. (ed.) Kluwer Academic Publishers
    • Reps, T.: Demand interprocedural program analysis using logic databases. In: Ramakrishnan, R. (ed.) Applications of Logic Databases, pp. 163-196. Kluwer Academic Publishers (1994)
    • (1994) Applications of Logic Databases , pp. 163-196
    • Reps, T.1
  • 25
    • 0002823436 scopus 로고
    • Two approaches to interprocedural data flow analysis
    • Muchnick, S.S., Jones, N.D. (eds.) Prentice-Hall, Inc., Englewood Cliffs
    • Sharir, M., Pnueli, A.: Two approaches to interprocedural data flow analysis. In: Muchnick, S.S., Jones, N.D. (eds.) Program Flow Analysis, pp. 189-233. Prentice-Hall, Inc., Englewood Cliffs (1981)
    • (1981) Program Flow Analysis , pp. 189-233
    • Sharir, M.1    Pnueli, A.2
  • 27
    • 0034276287 scopus 로고    scopus 로고
    • Analysis and testing of programs with exception handling constructs
    • Sinha, S., Harrold, M.J.: Analysis and testing of programs with exception handling constructs. IEEE Trans. Softw. Eng. 26(9), 849-871 (2000)
    • (2000) IEEE Trans. Softw. Eng. , vol.26 , Issue.9 , pp. 849-871
    • Sinha, S.1    Harrold, M.J.2
  • 28
    • 79251564956 scopus 로고    scopus 로고
    • Pick your contexts well: Understanding object-sensitivity (the making of a precise and scalable pointer analysis)
    • ACM Press January
    • Smaragdakis, Y., Bravenboer, M., Lhoták, O.: Pick your contexts well: Understanding object-sensitivity (the making of a precise and scalable pointer analysis). In: ACM Symposium on Principles of Programming Languages (POPL), pp. 17-30. ACM Press (January 2011)
    • (2011) ACM Symposium on Principles of Programming Languages (POPL) , pp. 17-30
    • Smaragdakis, Y.1    Bravenboer, M.2    Lhoták, O.3
  • 29
    • 33646732224 scopus 로고    scopus 로고
    • Using Datalog with Binary Decision Diagrams for Program Analysis
    • Yi, K. (ed.) APLAS 2005. Springer, Heidelberg
    • Whaley, J., Avots, D., Carbin, M., Lam,M.S.: Using Datalog with Binary Decision Diagrams for Program Analysis. In: Yi, K. (ed.) APLAS 2005. LNCS, vol. 3780, pp. 97-118. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3780 , pp. 97-118
    • Whaley, J.1    Avots, D.2    Carbin, M.3    Lam, M.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.