2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation 2009
DOI: 10.1109/scam.2009.22
|View full text |Cite
|
Sign up to set email alerts
|

A Value Analysis for C Programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(21 citation statements)
references
References 1 publication
0
21
0
Order By: Relevance
“…We recall multi-threaded programs and context-bounded analysis before we give some details on the two pillars of our approach: the lazy sequentialization performed by the tool LazyCSeq [16] and the value analysis performed by the tool Frama-C [2].…”
Section: Verification Approachmentioning
confidence: 99%
“…We recall multi-threaded programs and context-bounded analysis before we give some details on the two pillars of our approach: the lazy sequentialization performed by the tool LazyCSeq [16] and the value analysis performed by the tool Frama-C [2].…”
Section: Verification Approachmentioning
confidence: 99%
“…Frama-C [5] is an open-source, extensible, static-analysis framework for C. It features a value-analysis plug-in [2]: an abstract interpreter roughly comparable to Polyspace [10] and Astrée [1]. The value analysis uses non-relational domains adapted to the C language; it soundly detects and warns about a sizable set of C's undefined and unspecified behaviors.…”
Section: Frama-cmentioning
confidence: 99%
“…2 Indeed, LLVM ships with the Bugpoint tool 3 that automates reduction at the level of LLVM IR. The importance that compiler developers place on small test cases stems from the simple fact that manual test-case reduction is both difficult and time consuming.…”
Section: Introductionmentioning
confidence: 99%
“…Many existing tools can detect undefined behavior as listed in Figure 3. For example, gcc provides the -ftrapv option to insert run-time checks for signed integer overflows [42: §3.18]; IOC [11] (now part of clang's sanitizers [9]) and Kint [50] cover a more complete set of integer errors; Saturn [12] finds null pointer dereferences; several dedicated C interpreters such as kcc [14] and Frama-C [5] perform checks for undefined behavior. See Chen et al's survey [6] for a summary.…”
Section: Related Workmentioning
confidence: 99%
“…SOSP'13, Nov. [3][4][5][6]2013 The code becomes vulnerable as gcc optimizes away the second if statement [13].…”
Section: Introductionmentioning
confidence: 99%