نتایج جستجو برای: control flow graph cfg

تعداد نتایج: 1924486  

2015
K. Rustan M. Leino Valentin Wüstholz

Developing provably correct programs is an incremental process that often involves a series of interactions with a program verifier. To increase the responsiveness of the program verifier during such interactions, we designed a system for fine-grained caching of verification results. The caching system uses the program’s call graph and control-flow graph to focus the verification effort on just...

Journal: :Theor. Comput. Sci. 2011
Sebastian Danicic Richard W. Barraclough Mark Harman John Howroyd Ákos Kiss Michael R. Laurence

There are several similar, but not identical, definitions of control dependence in the literature. These definitions are given in terms of control flow graphs which have had extra restrictions imposed (for example, end-reachability). We define two new generalisations of non-termination insensitive and non-termination sensitive control dependence called weak and strong control-closure. These are...

1993
Philipp Hoschka Christian Huitema

A common approach to building high performance protocol software is the implementation of so-called fast paths. A fast path increases the execution speed of the most frequently used path through the protocol software. However, today, a fast path implementation requires extensive manual performance analysis and intuition on behalf of the protocol programmer. This paper presents work in progress ...

2001
Robert Kramer Mary Lou Soffa

As the number of available multiprocessors increases, so does the importance of providing software support for these systems, including parallel compilers. Data flow analysis, an important component of software tools, may be computed many times during the compilation of a program, especially when compiling for a multiprocessor. Although converting a sequential data flow algorithm to a parallel ...

2003
Sami Beydeda Volker Gruhn

Although both blackand white-box testing have the same objective, namely detecting faults in a program, they are often conducted separately. In our opinion, the reason is the lack of techniques and tools integrating both strategies, although integration can substantially decrease testing costs. Specifically, an integrated technique can generate a reduced test suite, as single test cases can cov...

2005
Christopher Krügel Engin Kirda Darren Mutz William K. Robertson Giovanni Vigna

Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at which worms spread to large computer populations, countermeasures based on human reaction time are not feasible. Therefore, recent research has focused on devising new techniques to detect and contain network worms without the ...

1991

In the context of synthesis, scheduling assigns operations to control steps. Operations are the atomic components used for describing behavior, for example, arithmetic and Boolean operations. They are ordered partially by data dependencies (data-flow graph) and by control constructs such as conditional branches and loops (control-flow graph). A control step usually corresponds to one state, one...

Journal: :Journal of the California Dental Association 1991
Sue Black Philipp Bouillon

A pilot experiment was conducted at Dagstuhl using the ’Beyond program slicing’ seminar attendees. Attendees were split into three groups: all were given the same program to understand and a list of program comprehension related questions to answer. Group one had only the source code, group two had the source code and the dynamic trace of the program, group three had the source and a control-fl...

2015
Vida Ghanaei Costas S. Iliopoulos Richard E. Overill

In this paper, we present carefully selected critical malicious patterns, which are in common among malware variants in the same malware family, but not other malware families, using statistical information processing. The analysed critical malicious patterns can be an effective training dataset, towards classification of known and unknown malware variants. We present malware variants as a set ...

2012
Nishant Sinha Nimit Singhania Satish Chandra Manu Sridharan

Most symbolic bug detection techniques perform search over the program control flow graph based on either forward symbolic execution or backward weakest preconditions computation. The complexity of determining interprocedural all-path feasibility makes it difficult for such analysis to judge upfront whether the behavior of a particular caller or callee procedure is relevant to a given property ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید