[1] 阳小奇, 刘坚. 一种基于契约的跨过程安全分析方法[J]. 西安电子科技大学学报, 2006, 33(3):390-394.
Yang Xiaoqi, Liu Jian. A Contract-based Interprocedural Safety Analysis Method.[J]. Journal of Xidian University, 2006, 33(3):390-394.
[2] Kahlon V. Bootstrapping: a Technique for Scalable Flow and Context Sensitive Pointer Alias Analysis[C/OL]. [2009-05-12]. http://userweb.cs.utexas.edu/~kahlon/papers/pldi08.ps.
[3] Woo J W, Gaudiot J L, Wendelborn A L. Alias Analysis in Java with Reference-Set Representation for High-Performance Computing [J]. International Journal of Parallel Programming, 2004, 32(1): 39-76.
[4] Burke M, Carini P R, Choi J D. Interprocedural Pointer Alias Analysis [R/OL]. [2009-05-12]. http://www.research.ibm.com/people/h/hind/RC21055.PS.
[5] Ohata F, Inoue K. JAAT: Java Alias Analysis Tool for Program Maintenance Activities[C/OL]. [2009-05-12]. http://www.computer.org/portal/web/csdl/doi/10.1109/ISORC.2006.43.
[6] Emami M. A Practical Inter-procedural Alias Analysis for an Ptimizing/Paralleling Compiler [D]. Montreal: School of Computer Science, McGill University, 1993.
[7] Sinha S, Harrold M J. Analysis and Testing of Programs with Exception Handling Constructs [J]. IEEE Trans on Software Engineering, 2000, 26(9):849-871.
[8] Pfleeger S L, Atlee J M. Software Engineering: Theory and Practice [M]. 3rd Ed. New Jersey: Prentice Hall, 2006.
[9] Xin Zheng, Rugina. Demand Driven Alias Analysis for C[C/OL]. [2009-05-12]. http://www.cs.cornell.edu/~rugina/papers/popl08.pdf.
[10] Hardekopf B, Lin C. Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis [C/OL]. [2009-05-12].
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.127.998&rep=rep1&type=pdf.
[11] Zhu Jianwen, Silvian C. Symbolic Pointer Analysis Revisited [C/OL]. [2009-05-12]. http://portal.acm.org/citation.cfm?id=996860.
[12] Hardekopf B, Lin C. Semi-sparse Flow Sensitive Pointer Analysis [C/OL]. [2009-05-12]. http://userweb.cs.utexas.edu/~lin/papers/popl09.pdf.
[13] 姜淑娟,徐宝文,史亮. 一种基于异常传播分析的数据流分析方法 [J]. 软件学报, 2007, 18(1): 74-84.
Jiang Shujuan, Xu Baowen, Shi Liang. An Approach of Data-Flow Analysis Based on Exception Propagation Analysis[J]. Journal of Software, 2007, 18(1):74-84.
[14] Chang W, Streiff B, Lin C. Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis[C/OL]. [2009-05-12]. http://userweb.cs.utexas.edu/~lin/papers/ccs08.pdf. |