Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting

Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting Tian Tan,Yue Li and Jingling Xue SAS 2016 UNSW September,2016 ALSTRA
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting Tian Tan, Yue Li and Jingling Xue SAS 2016 September, 2016 1

A New Pointer Analysis for Object-Oriented Programs 2
A New Pointer Analysis for Object-Oriented Programs 2

Pointer Analysis Determine "which objects can a variable point to?" Foundation of many clients: Bug detection Security analysis Compiler optimization o Program understanding 3
Pointer Analysis Determine “which objects can a variable point to?” Foundation of many clients: ◦ Bug detection ◦ Security analysis ◦ Compiler optimization ◦ Program understanding ◦ … 3

Object-Oriented Programs ●Java,C#,Object--C,JavaScript,,.… Embedded software: You Mobile application: o Web server: Apache Tomcat® redhat JBoss Web Server Desktop application: eeclipse© OpenOffice" 4
Object-Oriented Programs Java, C#, Object-C, JavaScript, … ◦ Embedded software: ◦ Mobile application: ◦ Web server: ◦ Desktop application: 4

A Practically Useful Pointer Analysis for Object-Oriented Programs 5
A Practically Useful Pointer Analysis for Object-Oriented Programs 5

A Practically Useful Pointer Analysis for Object-Oriented Programs Good Context Abstraction (Context Sensitivity) 6
A Practically Useful Pointer Analysis for Object-Oriented Programs Good Context Abstraction (Context Sensitivity) 6

A Practically Useful Pointer Analysis for Object-Oriented Programs Good Context Abstraction (Context Sensitivity) k-CFA (call-site-sensitivity),type-sensitivity,... 7
A Practically Useful Pointer Analysis for Object-Oriented Programs Good Context Abstraction (Context Sensitivity) 7 k-CFA (call-site-sensitivity), type-sensitivity, …

Object-Sensitivity Arguably the best context abstraction for pointer analysis for object-oriented programs 8
Object-Sensitivity Arguably the best context abstraction for pointer analysis for object-oriented programs 8

Object-Sensitivity Widely used in diverse real-world clients Property Verification (e.g.,APl protocol) ISSTA'06,TOSEM'08,PLDI'14,FSE'15,.. Bug Detection (e.g.,data race,deadlock) PLDI'06,ICSE'09,ISSTA'13,OOPSLA'15,.. Security Analysis (e.g.,taint analysis) PLDI'09,IEEE S&P'II,FSE'14,NDSS'15,FSE'15,.. Other Fundamental Analyses (e.g.,slicing) o PLDI'07,PLDI'14,ICSE'14,ECOOP'16,.. 9
Object-Sensitivity Widely used in diverse real-world clients ◦ Property Verification (e.g., API protocol) ISSTA’06, TOSEM’08, PLDI’14, FSE’15, … ◦ Bug Detection (e.g., data race, deadlock) PLDI’06, ICSE’09, ISSTA’13, OOPSLA’15, … ◦ Security Analysis (e.g., taint analysis) PLDI’09, IEEE S&P’11, FSE’14, NDSS’15, FSE’15, … ◦ Other Fundamental Analyses (e.g., slicing) PLDI’07, PLDI’14, ICSE’14, ECOOP’16, … 9

Object-Sensitivity Widely implemented in analysis platforms DooP Chord WALA T.J.WATSON LIBRARIES FOR RNALYSIS DroidSafe TAJS FlowDroid APPOSCOPY 10
Object-Sensitivity Widely implemented in analysis platforms APPOSCOPY Chord 10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- Efficient and Precise Points-to Analysis:Modeling the Heap by Merging Equivalent Automata.pdf
- Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting.pdf
- Efficient and Precise Points-to Analysis:Modeling the Heap by Merging Equivalent Automata.pdf
- Precise and Efficient Points-to Analysis via New Context-Sensitivity and Heap Abstraction.pdf
- Reflection Analysis for Java:Uncovering More Reflective Targets Precisely.pdf
- Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity.pdf
- Precision-Guided Context Sensitivity for Pointer Analysis.pdf
- Understanding and Analyzing Java Reflection.pdf
- A Principled Approach to Selective Context Sensitivity for Pointer Analysis.pdf
- Making Pointer Analysis More Precise by Unleashing the Power of Selective Context Sensitivity.pdf
- 《无线互联网 Principles of Wireless Networking》课程教学资源(阅读材料)基于SDN的移动网络中可扩展的感知用户体验的路径选择.pdf
- 《无线互联网 Principles of Wireless Networking》课程教学资源(阅读材料)适用于5G毫米波车载通信的机器学习算法.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 06 DL for MEC.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 05-2 Random Access.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 05-1 Random Access.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 04-2 OFDMA-TDMA Cellular.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 04-1 OFDMA-TDMA Cellular.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 03 Cellular CDMA.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 02 FDM-TDMA Cellular.pdf
- 电子科技大学:《无线互联网 Principles of Wireless Networking》课程教学资源(课件讲稿)Handout 01 INTRODUCTION(王晟).pdf
- Program Tailoring:Slicing by Sequential Criteria.pdf
- Effective Soundness-Guided Reflection Analysis.pdf
- Self-Inferencing Reflection Resolution for Java.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第一章 系统概貌(刘玓).pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第二章 核心导言.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第三章 数据缓冲区高速缓冲.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第四章 文件和文件系统的内部结构.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第五章 文件系统的系统调用.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第六章 进程结构.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第七章 进程控制.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第八章 进程调度和时间.pdf
- 电子科技大学:《UNIX/Linux操作系统内核结构 unix/linux kernel structure》课程教学资源(课件讲稿)第九章 输入/输出子系统.pdf
- Automatic Self-Validation for Code Coverage Profilers.pdf
- Hunting for Bugs in Code Coverage Tools via Randomized Differential Testing.pdf
- Effort-Aware Just-in-Time Defect Prediction:Simple Unsupervised Models Could Be Better Than Supervised Models.pdf
- An Empirical Study on Dependence Clusters for Effort-Aware Fault-Proneness Prediction.pdf
- Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-Proneness Prediction? An Empirical Study.pdf
- 南京大学:《数据库概论 Introduction to Databases》课程教学资源(教学大纲,胡伟).pdf
- 高等教育出版社:《数据库系统实用教程》教材PDF电子版(2006,徐洁磐、柏文阳、刘奇志).pdf
- 高等教育出版社:《数据库系统实用教程》教材PDF电子版(2006,勘误表).pdf