PPT-Level by Level: Making Flow- and Context-Sensitive Pointer Analysis Scalable for Millions
Author : osiris717 | Published Date : 2024-11-08
Hongtao Yu Zhaoqing Zhang Xiaobing Feng Wei Huo Institute of Computing Technology Chinese Academy of Sciences htyu zqzhang fxb huowei ictaccn 1 Jingling Xue University
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Level by Level: Making Flow- and Contex..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Level by Level: Making Flow- and Context-Sensitive Pointer Analysis Scalable for Millions: Transcript
Hongtao Yu Zhaoqing Zhang Xiaobing Feng Wei Huo Institute of Computing Technology Chinese Academy of Sciences htyu zqzhang fxb huowei ictaccn 1 Jingling Xue University of New South Wales. –. . Part II. CS 8803 FPL. (Slides courtesy of John Whaley). 1. Unification vs. Inclusion. Earlier scalable pointer analysis was context-insensitive unification-based [. Steensgaard. ’96]. Pointers are . David Brumley. Carnegie Mellon University. Our story so far…. 2. U. nauthorized. C. ontrol. I. nformation. T. ampering. http://. propercourse.blogspot.com. /2010/05/. i. -believe-in-duct-. tape.html. B. . Steensgaard: . Points-to Analysis in Almost Linear Time. .. POPL 1996. M. Hind. : . Pointer analysis: haven't we solved this problem yet. ?. . PASTE 2001. Presented by Ronnie . Barequet. 23.03.14. Making Flow- and Context-Sensitive Pointer Analysis Scalable for Millions of Lines of Code. Hongtao Yu Zhaoqing Zhang Xiaobing Feng Wei Huo. Institute of Computing Technology, Chinese Academy of Sciences. static program analysis to. improve the performance. of runtime monitoring. Eric Bodden. Laurie . Hendren. Ondrej. . Lhotak. McGill University. University of Waterloo. Tale of the industry programmer. . Reverse engineering obfuscated . BINARIE. s. Saumya Debray. The University of Arizona. Tucson, AZ . 85721. The Problem. Rapid analysis and understanding of malware code essential for swift response to new threats. –. . Part II. CS . 6340. 1. Unification vs. Inclusion. Earlier scalable pointer analysis was context-insensitive unification-based [. Steensgaard. ’96]. Pointers are . either un-aliased . or point . Manuel . Fahndrich. Jakob. . Rehof. Manuvir. Das. Overview. Introduction . Using type inference for flow analysis. Polymorphic version of . Steensgaard’s. points-to analysis. Polymorphism responsible for context-sensitivity. Manuel . Fahndrich. Jakob. . Rehof. Manuvir. Das. Overview. Introduction . Using type inference for flow analysis. Polymorphic version of . Steensgaard’s. points-to analysis. Polymorphism responsible for context-sensitivity. Focus is the . logical . view of the system, not the physical. “What” the system is to accomplish, not how. Tools:. data flow diagrams. data dictionary. process specification. entity-relationship diagrams. 3. Requirements Analysis. The process and technique that a group of system analyst utilizes to identify, analyze, and understand system requirements. System’s requirements specify what the system must do as well as what property or quality the system must have. . Pointer Analysis. Prof. Gennady . Pekhimenko. University of Toronto. Winter 2018. The content of this lecture is adapted from the lectures of . Todd Mowry, Greg . Steffan. , and Phillip Gibbons. Basics. Guruprasad Aphale.. Comp 790 - Avionics. 12/10/2010. Model Driven Development. Automate development tasks. Provide a single . specification. Reuse the model for multiple platforms. Domain . Specific Languages for specific requirements. Ben . Hardekopf. Calvin Lin. The University of Texas at Austin. POPL ’09. Simplified by Eric . Villasenor. Overview. Background. Flow-Sensitive Analysis. Semi-Sparse Flow-Sensitive Analysis. Questions.
Download Document
Here is the link to download the presentation.
"Level by Level: Making Flow- and Context-Sensitive Pointer Analysis Scalable for Millions"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents