A proof method for the correctness of modularized 0CFA

نویسندگان

  • Oukseh Lee
  • Kwangkeun Yi
  • Yunheung Paek
چکیده

Modular program analysis, which analyzes separated program sources such as modules, is a practical alternative to whole-program analysis. It does not need the entire program text as its input, and if some parts of the program are modified, it re-analyzes only the dependent parts of a modified module. This article is about our findings when we tried to derive a modular version from a whole-program control-flow analysis (CFA) [1–3], to be used inside a modularized version of our exception analysis [4–6]: • Deriving a modular version from a whole-program monovariant (or context-insensitive) CFA makes the resulting analysis polyvariant (or contextsensitive) at the module level. • Hence the correctness of its modularized version cannot be proven in general with respect to the original CFA. • A convenient stepping stone to prove the correctness of a modularized version (instead of proving it

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TECHNICAL REPORT TR99-02 Type-Based Useless Variable Elimination

We show a type-based method for useless variable elimination, i.e., transformation that eliminates variables whose values contribute nothing to the nal outcome of a computation, and prove its correctness. The algorithm is a surprisingly simple extension of the usual type reconstruction algorithm. Our method seems more attractive than Wand and Siveroni's 0CFA-based method in many respects. First...

متن کامل

Functional Verification of High Performance Adders in COQ

Let us know how access to this document benefits you. Addition arithmetic design plays a crucial role in high performance digital systems. The paper proposes a systematic method to formalize and verify adders in a formal proof assistant Coq. The proposed approach succeeds in formalizing the gate-level implementations and verifying the functional correctness of the most important adders of inter...

متن کامل

Flow Analysis: Games and Nets

This paper presents a graph-based formulation of controlflow analysis using results from game semantics and proof-nets. Controlflow analysis aims to give a conservative prediction of the flow of control in a program. In our analysis, terms are represented by proof-nets and control-flow analysis amounts to the analysis of computation paths in the proof-net. We focus on a context free analysis kn...

متن کامل

1 Summary of Research Results 1 . 1 Research Objectives

We present a static analysis that detects potential runtime exceptions that are raised and never handled inside Standard ML(SML) programs. This analysis will predict abrupt termination of SML programs, which is SML’s only “safety hole.” Our implementation of this analysis has been applied to realistic SML programs and shows a promising cost-accuracy performance. For the ML-Lex program, for exam...

متن کامل

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Process. Lett.

دوره 81  شماره 

صفحات  -

تاریخ انتشار 2002