Interprocedural shape analysis for cutpoint-free programs

Noam Rinetzky*, Mooly Sagiv, Eran Yahav

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

44 Scopus citations

Abstract

We present a framework for interprocedural shape analysis, which is context - and flow-sensitive with the ability to perform destructive pointer updates. We limit our attention to cutpoint-free programs-programs in which reasoning on a procedure call only requires consideration of context reachable from the actual parameters. For such programs, we show that our framework is able to perform an efficient modular analysis. Technically, our analysis computes procedure summaries as transformers from inputs to outputs while ignoring parts of the heap not relevant to the procedure. This makes the analysis modular in the heap and thus allows reusing the effect of a procedure at different call-sites and even between different contexts occurring at the same call-site. We have implemented a prototype of our framework and used it to verify interesting properties of cutpoint-free programs, including partial correctness of a recursive quicksort implementation.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages284-302
Number of pages19
DOIs
StatePublished - 2005
Event12th International Symposium on Static Analysis, SAS 2005 - London, United Kingdom
Duration: 7 Sep 20059 Sep 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3672 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Symposium on Static Analysis, SAS 2005
Country/TerritoryUnited Kingdom
CityLondon
Period7/09/059/09/05

Fingerprint

Dive into the research topics of 'Interprocedural shape analysis for cutpoint-free programs'. Together they form a unique fingerprint.

Cite this