Sciweavers

21 search results - page 4 / 5
» Null dereference analysis in practice
Sort
View
COMPSAC
1999
IEEE
14 years 26 days ago
Detecting Null Pointer Violations in Java Programs
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiri...
PIMRC
2010
IEEE
13 years 6 months ago
Vandermonde-subspace frequency division multiplexing receiver analysis
Abstract--Vandermonde-subspace frequency division multiplexing (VFDM) is a technique for interference cancellation in overlay networks that allows a secondary network to operate si...
Leonardo S. Cardoso, Francisco Rodrigo P. Cavalcan...
PLDI
2000
ACM
14 years 3 days ago
Off-line variable substitution for scaling points-to analysis
Most compiler optimizations and software productivity tools rely on information about the effects of pointer dereferences in a program. The purpose of points-to analysis is to com...
Atanas Rountev, Satish Chandra
SIGSOFT
2003
ACM
14 years 9 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
POPL
2012
ACM
12 years 4 months ago
A type system for borrowing permissions
In object-oriented programming, unique permissions to object references are useful for checking correctness properties such as consistency of typestate and noninterference of conc...
Karl Naden, Robert Bocchino, Jonathan Aldrich, Kev...