Exploring C semantics and pointer provenance

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provenance Analyzer: Exploring Provenance Semantics with Logic Rules

What exactly can we say about the dependency between artifact A and process P? Can we say that A was in fact generated by P, or was A generated by another process Q which used an artifact B that was generated by P? In fact, we cannot be sure. In particular, the given provenance information is insufficient to describe unambiguously in which order some basic OPM events (i.e., start of P, creation...

متن کامل

Pointer Semantics with Forward Propagation

Pointer semantics describing a formal language with the possibility of self-reference have been invented by Haim Gaifman; they form a fundamental way of understanding the semantics of logic programming, but have also been used extensively in philosophical logic and other applications of logic. In pointer semantics, truth values flow backwards along from the defining statement to the proposition...

متن کامل

Capturing pointer semantics and scoping rules

The purpose of this paper is to present a relation-based semantic deenition of imperative programming languages, that captures two arcane aspects: pointers and scoping rules. These two aspects are captured with a single mathematical device, which deals with an original deenition of the notion of state. 1 Background We consider an imperative, block-structured, programming language, such as C, an...

متن کامل

Interprocedural Pointer Analysis for C Interprocedural Pointer Analysis for C

Interprocedural pointer analysis provides information on the values pointer variables may have at various points in a program. It is especially useful in languages like C, where pointers are extensively used. This analysis does not improve code directly but is used by other optimizations. This paper presents a framework in which to perform pointer analysis. Basic questions that any pointer anal...

متن کامل

Towards Semantics for Provenance Security

Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessitating restrictions on the use of both data and provenance to enforce security requirements. This paper proposes extensional semantic definitions for provenance security. The semantic definitions require that provenanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ACM on Programming Languages

سال: 2019

ISSN: 2475-1421

DOI: 10.1145/3290380