Proceedings of the 2007 Conference on Specification and Verification of Component-Based Systems 6th Joint Meeting of the Europe 2007
DOI: 10.1145/1292316.1292319
|View full text |Cite
|
Sign up to set email alerts
|

Reachability analysis for annotated code

Abstract: Well-specified programs enable code reuse and therefore techniques that help programmers to annotate code correctly are valuable. We devised an automated analysis that detects unreachable code in the presence of code annotations. We implemented it as an enhancement of the extended static checker ESC/Java2 where it serves as a check of coherency of specifications and code. In this article we define the notion of semantic unreachability, describe an algorithm for checking it and demonstrate on a case study that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…The problem of detecting inconsistent code has been studied quite extensively in the literature [6,12,13,19,21,24,24,34]. Note that many of these papers use slightly different terminology such as deviant code [13], doomed code [21], infeasible code [2], and fatal code [34].…”
Section: Related Workmentioning
confidence: 99%
“…The problem of detecting inconsistent code has been studied quite extensively in the literature [6,12,13,19,21,24,24,34]. Note that many of these papers use slightly different terminology such as deviant code [13], doomed code [21], infeasible code [2], and fatal code [34].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, static verification techniques are being used to prove the existence of infeasible code [16,13,4,21]. These techniques prove the existence of statements that do not occur on any feasible (complete) control-flow path in a program.…”
Section: Introductionmentioning
confidence: 99%
“…Janota et al [16] present an approach to detect unreachable code in the presence of logic specifications. They only focus on the subset of infeasible code that is not forward reachable.…”
Section: Introductionmentioning
confidence: 99%
“…The effect of having one error mask others is particularly acute for ESC/Java2 (even more so than in ordinary compilers) thus making effective the more resilient, though less powerful, complementary verification capabilities of other techniques such as those implemented in JML4 (and recently added to ESC/Java2 [17]). Our preliminary use of JML4 has demonstrated that, e.g., nullity type errors once fixed allow ESC to push further its analysis, helping expose yet more bugs in code and specifications, which leads to uncovering further nullity type errors, etc.…”
Section: Introductionmentioning
confidence: 99%