Alias Analysis by Means of a Model Checker
نویسندگان
چکیده
We study the application of a standard model checker tool, Spin, to the well-known problem of computing a may-alias relation for a C program. A precise may-alias relation can significantly improve code optimization, but in general it may be computationally too expensive. We show that, at least in the case of intraprocedural alias analysis, a model checking tool has a great potential for precision and efficiency. For instance, we can easily deal, with good precision, with features such as pointer arithmetic, arrays, structures and dynamic memory allocation. At the very least, the great flexibility allowed in defining the may-alias relation, should make it easier to experiment and to examine the connections among the accuracy of an alias analysis and the optimizations available in the various compilation phases.
منابع مشابه
Reachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملMCDASH: Refinement-Based Property Verification for Machine Code
This paper presents MCDASH, a refinement-based model checker for machine code. While model checkers such as SLAM, BLAST, and DASH have each made significant contributions in the field of verification/flaw-detection, their use has been restricted to programs for which source code is available. This paper discusses several challenges that arise when working with machine code, and explains how the...
متن کاملMCDASH: Refinement-Based Property Verification
This paper presents MCDASH, a refinement-based model checker for machine code. While model checkers such as SLAM, BLAST, and DASH have each made significant contributions in the field of verification/flaw-detection, their use has been restricted to programs for which source code is available. This paper discusses several challenges that arise when working with machine code, and explains how the...
متن کاملAutomatic Analysis of a Non-Repudiation Protocol
We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairness, without resorting to a trusted third party, by means of a probabilistic algorithm. By using the PRISM model checker, we estimate the probability for a malicious user to break the non-repudiation property, depending on various parameters of the protocol.
متن کاملEvaluation of halitosis using Halitosis Associated Life Quality Test questionnaire and the Etiquette checker device
BACKGROUND AND AIM: Halitosis is an unpleasant disorder and a common phenomenon in people. The study aim was evaluation of halitosis using Halitosis Associated Life Quality Test questionnaires (HALT) and the Etiquette checker device.METHODS: The questionnaires were given to 345 individuals who referred to the Kerman Dental School and dental clinics, Kerman, Iran. At the same time, their halitos...
متن کامل