نتایج جستجو برای: control flow graph cfg

تعداد نتایج: 1924486  

2005
P. Masci

Data Flow Analysis (DFA for short) is a basic technique to collect statical information on run-time behaviors of programs: it is essential in optimizing compilers and is also used in type inference problems [1]. When performing a DFA, the program to be analysed is modeled by its Control Flow Graph (CFG) and by a set of transformation functions, one for each node in the graph. The set of program...

Journal: :Inf. Process. Lett. 2006
Cinzia Bernardeschi Giuseppe Lettieri Luca Martini Paolo Masci

Data Flow Analysis (DFA for short) is a basic technique to collect statical information on run-time behaviors of programs: it is essential in optimizing compilers and is also used in type inference problems [1]. When performing a DFA, the program to be analyzed is modeled by its Control Flow Graph (CFG) and by a set of transformation functions, one for each node in the graph. The set of program...

1993
Vivek Sarkar Barbara B. Simons

We categorize and compare diierent representations of program dependence graphs, including the Control Flow Graph (CFG) which is a sequential representation lacking data dependences, the Program Dependence Graph (PDG) which is a parallel representation of a sequential program and is comprised of control and data dependences, and more generally, the Parallel Program Graph (PPG) which is a parall...

2011
Sébastien Bardin Philippe Herrmann Franck Védrine

This paper addresses the issue of recovering a both safe and precise approximation of the Control Flow Graph (CFG) of an unstructured program, typically an executable file. The problem is tackled in an original way, with a refinement-based static analysis working over finite sets of constant values. Requirement propagation allows the analysis to automatically adjust the domain precision only wh...

2013
Dan Caselden Alex Bazhanyuk Mathias Payer Stephen McCamant Dawn Xiaodong Song

Security analysis often requires understanding both the control and data-flow structure of a binary. We introduce a new program representation, a hybrid informationand control-flow graph (HI-CFG), and give algorithms to infer it from an instruction-level trace. As an application, we consider the task of generalizing an attack against a program whose inputs undergo complex transformations before...

2016
Wei-Tsun Sun Hugues Cassé

Static analysis requires the full knowledge of the overall program structure. The structure of a program can be represented by a Control Flow Graph (cfg) where vertices are basic blocks (bb) and edges represent the control flow between the bb. To construct a full cfg, all the bb as well as all of their possible targets addresses must be found. In this paper, we present a method to resolve dynam...

2013
Jianmin Pang Yichi Zhang Chao Dai Qiang Wang

In order to avoid being static analyzed, hacker rely on various obfuscation techniques to hide its malicious characters. These techniques are very effective against common disassembles, preventing binary file from being disassembled correctly. The study presents novel disassemble algorithm which based on analyzed Control Flow Graph (CFG) and Data Flow Graph (DFG) information improve the ability...

2000
Christophe Paoli Marie-Laure Nivet Jean François Santucci

Validation of VHDL descriptions at the early phases of the microelectronic design is one of the most time consuming task design. This paper presents a test vector generation method for behavioral VHDL design. This method analyzes control and dependence flow of VHDL program. We use the cyclomatic complexity, that is a software metric based on a graph associated with the control part of software:...

1999
Jong-Deok Choi David Grove Michael Hind Vivek Sarkar Thomas J. Watson

The Factored Control Flow Graph, FCFG, is a novel representation of a program's intraprocedural control ow, which is designed to eeciently support the analysis of programs written in languages, such as Java, that have frequently occurring operations whose execution may result in exceptional control ow. The FCFG is more compact than traditional CFG representations for exceptional control ow, yet...

2009
Tirthankar Gayen R. B Misra

In this paper a unique methodology based on the execution scenario analysis of the COTS component based software application has been formulated to help the developers and integrators to regain some control over their COTS component based software application systems by predicting the upper and lower bound on the reliability of their application systems. At the component level the CFG (control ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید