2000
DOI: 10.1016/s0950-5849(00)00119-1
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic data flow analysis for Java programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2001
2001
2014
2014

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 6 publications
0
11
0
1
Order By: Relevance
“…Dynamic data flow analysis techniques has been proposed by Chen and Low, and Boujarwah et al for runtime verification of C++ and Java programs respectively [CL95,BSAD00]. These techniques monitor data events during a program execution to detect data flow anomalies, such as usage of variables before their initialization, or killing definitions of values which were never used before the kill.…”
Section: Dynamic Data Analysismentioning
confidence: 99%
“…Dynamic data flow analysis techniques has been proposed by Chen and Low, and Boujarwah et al for runtime verification of C++ and Java programs respectively [CL95,BSAD00]. These techniques monitor data events during a program execution to detect data flow anomalies, such as usage of variables before their initialization, or killing definitions of values which were never used before the kill.…”
Section: Dynamic Data Analysismentioning
confidence: 99%
“…Dynamic data flow analysis in functional programs was investigated by Huang [26] and extended to Object-Oriented programs by Chen [13] and Boujarwah [11]. It is part of dynamic information flow analysis [34] and dynamic program slicing [6], and it is used in testing [24], debugging [5], impact analysis [7], detection of bugs [15], detection of security risks [14], and so forth.…”
Section: Previous Workmentioning
confidence: 99%
“…It has mainly been used for testing procedural programs, but has been extended to object-oriented programming languages as well [24,25]. Since the goal of those approaches is to detect improper sequences on data access, they do not capture how objects are passed through the system, nor how read and write accesses relate to method executions.…”
Section: Related Workmentioning
confidence: 99%