2013
DOI: 10.1007/978-3-319-02444-8_44
|View full text |Cite
|
Sign up to set email alerts
|

A Theory for Control-Flow Graph Exploration

Abstract: Abstract. Detection of infeasible code has recently been identified as a scalable and automated technique to locate likely defects in software programs. Given the (acyclic) control-flow graph of a procedure, infeasible code detection depends on an exhaustive search for feasible paths through the graph. A number of encodings of control-flow graphs into logic (understood by theorem provers) have been proposed in the past for this application. In this paper, we compare the performance of these different encodings… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Most procedures still can be analyzed within few seconds. We believe that, by further improving the reuse of theorem prover results as suggested in [3], we can reduce these extra costs even further.…”
Section: Discussionmentioning
confidence: 99%
“…Most procedures still can be analyzed within few seconds. We believe that, by further improving the reuse of theorem prover results as suggested in [3], we can reduce these extra costs even further.…”
Section: Discussionmentioning
confidence: 99%
“…The lacking of alias analysis may lead to false positives or false negatives in static detection. Our system is based on control ow graph [9] of web applications' source codes.First of all, system converts PHP source codes of web application into parse trees[10] using Java lexical analyzer generator JFlex. Then, it constructs a divided control ow graph for each function.…”
Section: Introductionmentioning
confidence: 99%