参考文献
[1]Das M,Liblit B,Fhndrich M,et al.Estimating the Impact of Scalable Pointer Analysis on Optimiza-tion[C]//Proceedings of the 8th International Symposium on Static Analysis.Paris,France:[s.n.],2001:260-278.
[2]Vanoverberghe D,Tillmann N,Piessens F.Test Input Generation for Programs with Pointers[C]//Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems.New York,USA:ACM
Press,2009: 277-291.
[3]Avots D,Dalton M,Livshits V B,et al.Improving Software Security with a C Pointer Analysis[C]//Proceedings of the 27th International Conference on Software Engineering.Saint Louis,USA:[s.n.],2005:332-341.
[4]Choi J D,Burke M,Carini P.Efficient Flow-sensitive Interprocedural Computation of Pointer-induced Aliases and Side Effects[C]//Proceedings of the 20th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming
Languages.Charleston,USA:[s.n.],1993:232-245.
[5]Chatterjee R,Ryder B G,Landi W A.Complexity of Points-to Analysis of Java in the Presence of Excep-tions[J].IEEE Transactions on Software Engineering,2001,27(6):481-512.
[6]Hardekopf B,Lin C.Semi-sparse Flow-sensitive Pointer Analysis[C]//Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.Savannah,USA:[s.n.],2009:226-238.
[7]Hardekopf B,Lin C.Flow-sensitive Pointer Analysis for Millions of Lines of Code[C]//Proceedings of the 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization.Chamonix,France:[s.n.],2011:289-298.
[8]Sridharan M,Gopan D,Shan L,et al.Demand-driven Points-to Analysis for Java[C]//Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-oriented Programming,Systems,Languages,and Appli-cations.San Diego,USA:
[s.n.],2005:59-76.
[9]Sridharan M,Bodík R.Refinement-based Context-sensitive Points-to Analysis for Java[C]//Proceedings of the 27th ACM SIGPLAN Conference on Program-ming Language Design and Implementation.Ottawa,Canada:[s.n.],2006:387-400.
[10]Xu Guoqing,Rountev A,Sridharan M.Scaling CFL-reachability-based Points-to Analysis Using Context-sensitive Must-not-alias Analysis[C]//Proceedings of the 23rd European Conference on Object-oriented Programming.Genoa,Italy:[s.n.
],2009:98-122.
[11]Lu Yi,Shang Lei,Xie Xinwei,et al.An Incremental Points-to Analysis with CFL-reachability[C]//Pro-ceedings of the 22nd International Conference on Com-piler Construction.Rome,Italy:[s.n.]2013:61-81.
[12]Reps T.Program Analysis via Graph Reachability[C]//Proceedings of the 14th International Conference on Logic Programming.New York,USA:ACM Press,1997:5-19.
[13]Lhoták O,Hendren L.Scaling Java Points-to Analysis Using Spark[C]//Proceedings of the 12th International Conference on Compiler Construction.Warsaw,Poland:[s.n.],2003:153-169.
[14]de A,D’Souza D.Scalable Flow-sensitive Pointer Anal-ysis for Java with Strong Updates[C]//Proceedings of the 26th European Conference on Object-oriented Pro-gramming.Beijing,China:[s.n.],2012:665-687.
[15]Emami M,Ghiya R,Hendren L J.Context-sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers[C]//Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation.Orlando,USA:[s.n.
],1994:242-256.
[16]Whaley J,Lam M S.An Efficient Inclusion-based Points-to Analysis for Strictly-typed Languages[C]//Proceedings of the 9th International Symposium on Static Analysis.Madrid,Spain:[s.n.],2002:180-195.
[17]Kahlon V.Bootstrapping:A Technique for Scalable Flow and Context-sensitive Pointer Alias Analysis[C]//Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation.Tucson,USA:[s.n.],2008:249-
259.
[18]Yu Hongtao,Xue Jingling,Huo Wei,et al.Level by Level:Making Flow-and Context-sensitive Pointer Analysis Scalable for Millions of Lines of Code[C]//Proceedings of the 8th Annual IEEE/ACM International Symposium on Code Generation
and Optimization.Boston,USA:[s.n.],2010:218-229.
[19]Steensgaard B.Points-to Analysis in Almost Linear Time[C]//Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.Saint Petersburg Beach,USA:[s.n.],1996:32-41.
[20]Andersen L O.Program Analysis and Specialization for the C Programming Language[D].Cophenhagen,Denmark:University of Cophenhagen,1994.
[21]Milanova A,Rountev A,Ryder B G.Parameterized Object Sensitivity for Points-to Analysis for Java[J].ACM Transactions on Software Engineering and Methodology,2005,14(1):1-41.
[22]Whaley J,Lam M S.Cloning-based Context-sensitive Pointer Alias Analysis Using Binary Decision Diagrams[C]//Proceedings of IEEE SIGPLAN 2004 Conference on Programming Language Design and Implementation.Washington D.C.,USA:IEEE
Press,2004:131-144.
[23]Zhu Jianwen,Calman S.Symbolic Pointer Analysis Revisited[C]//Proceedings of IEEE SIGPLAN Con-ference on Programming Language Design and Im-plementation.Washington D.C.,USA:IEEE Press,2004:145-157.
[24]Lhoták O,Hendren L.Context-sensitive Points-to Analysis:Is It Worth It?[C]//Proceedings of the 15th International Conference on Compiler Construction.Plovdiv,Bulgaria:[s.n.],2006:47-64.
[25]Lhoták O,Chung K C A.Points-to Analysis with Efficient Strong Updates[C]//Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.Austin,USA:IEEE Press,2011:3-16.
[26]Li Lian,Cifuentes C,Keynes N.Boosting the Perfor-mance of Flow-sensitive Points-to Analysis Using Value Flow[C]//Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Founda-tions of Software
Engineering.Szeged,Hungary:[s.n.],2011:343-353.
[27]Reps T,Horwitz S,Sagiv M.Precise Interprocedural Dataflow Analysis via Graph Reachability[C]//Pro-ceedings of the 22nd ACM SIGPLAN-SIGACT Sym-posium on Principles of Programming Languages.San Francisco,USA:ACM Press,1995:49-61.
[28]Heintze N,Tardieu O.Demand-driven Pointer Analy-sis[C]//Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation.Snowbird,USA:ACM Press,2001:24-34.
[29]Zheng Xin,Rugina R.Demand-driven Alias Analysis for C[C]//Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Pro-gramming Languages.San Francisco,USA:ACM Press,2008:197-208.
[30]Shang Lei,Xie Xinwei,Xue Jingling.On-demand Dynamic Summary-based Points-to Analysis[C]//Proceedings of the 20th International Symposium on Code Generation and Optimization.San Jose,USA:[s.n.],2012:264-274.
[31]王戟,马晓东,董威,等.基于流敏感上下文敏感的需求驱动式内存泄漏检测[J].计算机科学与技术,2009,24(2):347-356.
[32]马晓东,匡碧英,尉红梅.需求驱动的流敏感别名检查[J].计算机工程与应用,2013,49(10):35-39.
[33]逄龙,苏小红,马培军,等.流敏感按需指针别名分析算法[J].计算机研究与发展,2015,52(7):1620-1630.
[34]Ferrante J,Ottenstein K J,Warren J D.The Program Dependence Graph and Its Use in Optimization[J].ACM Transactions on Programming Languages and Systems,1987,9(3):319-349.
[35]Blackburn S M,Garner R,Hoffmann C,et al.The DaCapo Benchmarks:Java Benchmarking Development and Analysis[C]//Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-oriented Programming Systems,Languages,and
Applications.Portland,USA:[s.n.],2006:169-190.
[36]Yan Dacong,Xu Guoqing,Rountev A.Demand-driven Context-sensitive Alias Analysis for Java[C]//Pro-ceedings of 2011 International Symposium on Software Testing and Analysis.Toronto,Canada:[s.n.],2011:155-165.
[37]Do H,Elbaum S,Rothermel G.Infrastructure Support for Controlled Experimentation with Software Testing and Regression Testing Techniques[C]//Proceedings of International Symposium on Empirical Software Eng-ineering.Los
Angeles,USA:[s.n.],2004:60-70.
编辑索书志 |