• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 922
Next 10 →

Dynamic vs. static flow-sensitive security analysis

by Alejandro Russo, Andrei Sabelfeld , 2010
"... This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static information-flow analysis is a natural generalization of flowinsensitive static analysis, which allows accepting more secure program ..."
Abstract - Cited by 63 (14 self) - Add to MetaCart
impossibility of a sound purely dynamic information-flow monitor that accepts programs certified by a classical flow-sensitive static analysis. A side implication is impossibility of permissive dynamic instrumented security semantics for information flow, which guides us to uncover an unsound semantics from

The Determinants of Credit Spread Changes.

by Pierre Collin-Dufresne , Robert S Goldstein , J Spencer Martin , Gurdip Bakshi , Greg Bauer , Dave Brown , Francesca Carrieri , Peter Christoffersen , Susan Christoffersen , Greg Duffee , Darrell Duffie , Vihang Errunza , Gifford Fong , Mike Gallmeyer , Laurent Gauthier , Rick Green , John Griffin , Jean Helwege , Kris Jacobs , Chris Jones , Andrew Karolyi , Dilip Madan , David Mauer , Erwan Morellec , Federico Nardari , N R Prabhala , Tony Sanders , Sergei Sarkissian , Bill Schwert , Ken Singleton , Chester Spatt , René Stulz - Journal of Finance , 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract - Cited by 422 (2 self) - Add to MetaCart
are highly crosscorrelated, and principal components analysis implies they are mostly driven by a single common factor. Although we consider several macro-economic and financial variables as candidate proxies, we cannot explain this common systematic component. Our results suggest that monthly credit spread

Flow-Sensitive Type Analysis for C++

by Paul R. Carini, Harini Srinivasan - RESEARCH REPORT RC 20267, IBM T. J. WATSON RESEARCH CENTER , 1995
"... Static determination of run-time types is a key analysis step for compile-time optimizations of object-oriented languages with dynamic dispatch of functions. Type information is fundamental for determining the virtual functions that can be invoked and enables a number of interprocedural analyses and ..."
Abstract - Cited by 21 (0 self) - Add to MetaCart
. In this paper, we show how an existing flow-sensitive pointer alias analysis that uses a compact representation can be adapted to provide a type analysis algorithm which computes type information in a lazy fashion, thereby incurring minimal additional overhead. We show that use of the type information as soon

Flow-sensitive static optimizations for runtime monitors.

by Eric Bodden , Patrick Lam , Laurie Hendren , 2007
"... Abstract Runtime monitoring enables developers to specify code that executes whenever certain sequences of events occur during program execution. Tracematches, a Java language extension, permit developers to specify and execute runtime monitors. Tracematches consist of regular expressions over even ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
well in most cases, more difficult cases with large overheads remained. In this paper, we propose three novel intraprocedural optimizations with the goal of eliminating the overhead from runtime monitors. Our optimizations rely on flow-sensitivity and precise local may-alias and must-alias information

Structural and Flow-Sensitive Types for Whiley

by David J. Pearce, James Noble , 2011
"... Modern statically typed languages require variables to be declared with a single static type, and that subtyping relationships between used-defined types be made explicit. This contrasts with dynamically typed languages, where variables are declared implicitly, can hold values of different types at ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
at different points and have no restrictions on flow (leading to ad-hoc and implicit subtyping). We present the flow-sensitive and structural type system used in the Whiley language. This permits variables to be declared implicitly, have multiple types within a function, and be retyped after runtime type tests

Flow-sensitive pointer analysis for millions of lines of code

by Ben Hardekopf, Calvin Lin - In Code Generation and Optimization (CGO), 2011 9th Annual IEEE/ACM International Symposium on , 2011
"... Abstract—Many program analyses benefit, both in precision and performance, from precise pointer analysis. An important dimension of pointer analysis precision is flow-sensitivity, which has been shown to be useful for applications such as program verification and static analysis of binary code, amon ..."
Abstract - Cited by 21 (0 self) - Add to MetaCart
Abstract—Many program analyses benefit, both in precision and performance, from precise pointer analysis. An important dimension of pointer analysis precision is flow-sensitivity, which has been shown to be useful for applications such as program verification and static analysis of binary code

A Practical Flow-Sensitive and Context-Sensitive C and C++ Memory Leak Detector

by David L. Heine, Monica S. Lam , 2003
"... This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. ..."
Abstract - Cited by 101 (5 self) - Add to MetaCart
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications.

Runtime Instrumentation for Precise Flow-Sensitive Type Analysis

by Etienne Kneuss, Viktor Kuncak
"... Abstract. We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the program execute and thereby read the important dynamic configuration data, then 2) invoke static analysis from t ..."
Abstract - Cited by 8 (5 self) - Add to MetaCart
Abstract. We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the program execute and thereby read the important dynamic configuration data, then 2) invoke static analysis from

Exploiting hardware performance counters with flow and context sensitive profiling

by Glenn Ammons, Thomas Ball, James R. Larus - ACM Sigplan Notices , 1997
"... A program pro le attributes run-time costs to portions of a program's execution. Most pro ling systems su er from two major de ciencies: rst, they only apportion simple metrics, such as execution frequency or elapsed time to static, syntactic units, such as procedures or statements; second, the ..."
Abstract - Cited by 254 (9 self) - Add to MetaCart
A program pro le attributes run-time costs to portions of a program's execution. Most pro ling systems su er from two major de ciencies: rst, they only apportion simple metrics, such as execution frequency or elapsed time to static, syntactic units, such as procedures or statements; second

General Flow-Sensitive Pointer Analysis and Call Graph

by Endre Horváth, István Forgács, Ákos Kiss, Judit Jász, Tibor Gyimóthy
"... Abstract. Pointer analysis is a well known, widely used and very important static program analyzing technique. After having studied the literature in this field of research we found that most of the methods approach the problem in a flow-insensitive way, i.e. they omit the use of the control-flow in ..."
Abstract - Add to MetaCart
information. Our goal was to develop a technique that is flow-sensitive and can be used in the analysis of large programs. During this process we have found that our method can give more accurate results if we build the call graph and compute the pointer information at the same time. In this paper we present
Next 10 →
Results 1 - 10 of 922
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University