Exploring C semantics and pointer provenance
نویسندگان
چکیده
منابع مشابه
Provenance Analyzer: Exploring Provenance Semantics with Logic Rules
What exactly can we say about the dependency between artifact A and process P? Can we say that A was in fact generated by P, or was A generated by another process Q which used an artifact B that was generated by P? In fact, we cannot be sure. In particular, the given provenance information is insufficient to describe unambiguously in which order some basic OPM events (i.e., start of P, creation...
متن کاملPointer Semantics with Forward Propagation
Pointer semantics describing a formal language with the possibility of self-reference have been invented by Haim Gaifman; they form a fundamental way of understanding the semantics of logic programming, but have also been used extensively in philosophical logic and other applications of logic. In pointer semantics, truth values flow backwards along from the defining statement to the proposition...
متن کاملCapturing pointer semantics and scoping rules
The purpose of this paper is to present a relation-based semantic deenition of imperative programming languages, that captures two arcane aspects: pointers and scoping rules. These two aspects are captured with a single mathematical device, which deals with an original deenition of the notion of state. 1 Background We consider an imperative, block-structured, programming language, such as C, an...
متن کاملInterprocedural Pointer Analysis for C Interprocedural Pointer Analysis for C
Interprocedural pointer analysis provides information on the values pointer variables may have at various points in a program. It is especially useful in languages like C, where pointers are extensively used. This analysis does not improve code directly but is used by other optimizations. This paper presents a framework in which to perform pointer analysis. Basic questions that any pointer anal...
متن کاملTowards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessitating restrictions on the use of both data and provenance to enforce security requirements. This paper proposes extensional semantic definitions for provenance security. The semantic definitions require that provenanc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ACM on Programming Languages
سال: 2019
ISSN: 2475-1421
DOI: 10.1145/3290380