L. O. Andersen, Program Analysis and Specialization for the C Programming Language, 1994.

R. Bodík, R. Gupta, and V. Sarkar, ABCD: eliminating array bounds checks on demand, Proceedings of Conference on Programming Language Design and Implementation, pp.321-333, 2000.

C. Calcagno, D. Distefano, P. W. Hearn, and H. Yang, Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic, Proceedings of Static Analysis Symposium, pp.182-203, 2006.
DOI : 10.1007/11823230_13

W. Chang, B. Streiff, and C. Lin, Efficient and extensible security enforcement using dynamic data flow analysis, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.39-50, 2008.
DOI : 10.1145/1455770.1455778

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.1548

J. Choi, R. Cytron, and J. Ferrante, Automatic construction of sparse data flow evaluation graphs, Proceedings of the 18th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '91, pp.55-66, 1991.
DOI : 10.1145/99583.99594

N. Dor, M. Rodeh, and S. Sagiv, Checking Cleanness in Linked Lists, Proceedings of Static Analysis Symposium, pp.115-134, 2000.
DOI : 10.1007/978-3-540-45099-3_7

M. D. Ernst, Invited Talk Static and dynamic analysis, Proceedings of the ACM-SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering , PASTE '04, p.35, 2004.
DOI : 10.1145/996821.996823

R. Ghiya, D. M. Lavery, and D. C. Sehr, On the importance of points-to analysis and other memory disambiguation methods for C programs, Proceedings of Programming Language Design and Implementation, pp.47-58, 2001.

B. Guo, Y. Wu, C. Wang, M. J. Bridges, G. Ottoni et al., Selective Runtime Memory Disambiguation in a Dynamic Binary Translator, Proceedings of European Joint Conferences on Theory and Practice of Software, pp.65-79, 2006.
DOI : 10.1007/11688839_6

B. Hardekopf and C. Lin, Flow-sensitive pointer analysis for millions of lines of code, International Symposium on Code Generation and Optimization (CGO 2011), pp.289-298, 2011.
DOI : 10.1109/CGO.2011.5764696

M. Hind, Pointer analysis, Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering , PASTE '01, pp.54-61, 2001.
DOI : 10.1145/379605.379665

S. Horwitz, Precise flow-insensitive may-alias analysis is NP-hard, ACM Transactions on Programming Languages and Systems, vol.19, issue.1, pp.1-6, 1997.
DOI : 10.1145/239912.239913

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.6454

Y. Vineet-kahlon, S. Yang, A. Sankaranarayanan, and . Gupta, Fast and accurate static data-race detection for concurrent programs, Proceedings of International Conference on Computer Aided Verification, pp.226-239, 2007.

V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar et al., Code-pointer integrity, Proceedings of Operating Systems Design and Implementation, pp.147-163, 2014.

W. Landi and B. G. Ryder, Pointer-induced aliasing: A problem classification, Proceedings of Symposium on Principles of Programming Languages, pp.93-103, 1991.
DOI : 10.1145/99583.99599

P. Larsen, R. Ladelsky, J. Lidman, S. A. Mckee, S. Karlsson et al., Parallelizing more Loops with Compiler Guided Refactoring, 2012 41st International Conference on Parallel Processing, pp.410-419, 2012.
DOI : 10.1109/ICPP.2012.48

H. Li, . Bor-yuh-evan, X. Chang, and . Rival, Shape Analysis for Unstructured Sharing, Proceedings of Static Analysis Symposium, 2015.
DOI : 10.1007/978-3-662-48288-9_6

URL : https://hal.archives-ouvertes.fr/hal-01249418

F. Logozzo and M. Fähndrich, Pentagons, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.796-807, 2010.
DOI : 10.1145/1363686.1363736

V. Martena and P. Pietro, Alias Analysis by Means of a Model Checker, Proceedings of Compiler Construction, pp.3-19, 2001.
DOI : 10.1007/3-540-45306-7_2

A. Mensi, Analyse des pointeurs pour le langage C, 2013.
URL : https://hal.archives-ouvertes.fr/pastel-00944703

R. Milewicz, R. Vanka, J. Tuck, D. Quinlan, and P. Pirkelbauer, Runtime checking C programs, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.2107-2114, 2015.
DOI : 10.1145/2695664.2695906

M. Mock, Dynamic analysis from the bottom up, Proceedings of International Conference on Software Engineering, 2003.

M. Mock, M. Das, C. Chambers, and S. J. Eggers, Dynamic points-to sets, Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering , PASTE '01, pp.66-72, 2001.
DOI : 10.1145/379605.379671

V. Nagaraj and R. Govindarajan, Approximating flow-sensitive pointer analysis using frequent itemset mining, 2015 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), pp.225-234, 2015.
DOI : 10.1109/CGO.2015.7054202

H. Nazaré, I. Maffra, W. Santos, L. Barbosa, L. Gonnord et al., Validation of memory accesses through symbolic analyses, Proceedings of Object-Oriented Programming, Systems, Languages & Applications, pp.791-809, 2014.

H. Oh, W. Lee, K. Heo, H. Yang, and K. Yi, Selective context-sensitivity guided by impact pre-analysis, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, pp.475-484, 2014.
DOI : 10.1145/2666356.2594318

O. Olivo, I. Dillig, and C. Lin, Static detection of asymptotic performance bugs in collection traversals, Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.369-378, 2015.

V. Paisante, M. Maalej, L. Barbosa, L. Gonnord, and F. Pereira, Symbolic range analysis of pointers, Proceedings of the 2016 International Symposium on Code Generation and Optimization, CGO 2016, 2016.
DOI : 10.1145/2854038.2854050

URL : https://hal.archives-ouvertes.fr/hal-01228928

D. J. Pearce, P. H. Kelly, and C. Hankin, Efficient field-sensitive pointer analysis for C, Proceedings of Program Analysis for Software Tools and Engineering, pp.37-42, 2004.
DOI : 10.1145/996821.996835

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.2104

F. Magno, Q. Pereira, and D. Berlin, Wave propagation and deep propagation for pointer analysis, Proceedings of International Symposium on Code Generation and Optimization, pp.126-135, 2009.

G. Ramalingam, The undecidability of aliasing, ACM Transactions on Programming Languages and Systems, vol.16, issue.5, pp.1467-1471, 1994.
DOI : 10.1145/186025.186041

R. Rugina and M. C. Rinard, Symbolic bounds analysis of pointers, array indices, and accessed memory regions, Proceedings of Programming Language Design and Implementation, pp.182-195, 2000.

S. Rus, L. Rauchwerger, and J. Hoeflinger, Hybrid analysis, Proceedings of the 16th international conference on Supercomputing , ICS '02, pp.274-284, 2002.
DOI : 10.1145/514191.514229

S. Sagiv, T. W. Reps, and R. Wilhelm, Solving shape-analysis problems in languages with destructive updating, ACM Transactions on Programming Languages and Systems, vol.20, issue.1, pp.1-50, 1998.
DOI : 10.1145/271510.271517

B. Steensgaard, Points-to analysis in almost linear time, Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '96, pp.32-41, 1996.
DOI : 10.1145/237721.237727

T. Ströder, J. Giesl, M. Brockschmidt, F. Frohn, C. Fuhs et al., Proving Termination and Memory Safety for Programs with Pointer Arithmetic, Proceedings of International Joint Conference on Automated Reasoning, pp.208-223, 2014.
DOI : 10.1007/978-3-319-08587-6_15

D. Wagner and D. Dean, Intrusion detection via static analysis, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.156-168, 2001.
DOI : 10.1109/SECPRI.2001.924296

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5910

J. Wu, G. Hu, Y. Tang, and J. Yang, Effective dynamic detection of alias analysis errors, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, pp.279-289, 2013.
DOI : 10.1145/2491411.2491439

D. Yan, G. Xu, and A. Rountev, Demand-driven context-sensitive alias analysis for Java, Proceedings of the 2011 International Symposium on Software Testing and Analysis, ISSTA '11, pp.155-165, 2011.
DOI : 10.1145/2001420.2001440

Y. Sen-ye, J. Sui, and . Xue, Region-based selective flow-sensitive pointer analysis, Proceedings of Static Analysis Symposium, pp.319-336, 2014.

S. Hsi, Y. , and S. Horwitz, Pointer-range analysis, Proceedings of Static Analysis Symposium Inria RESEARCH CENTRE GRENOBLE ? RHÔNE-ALPES Inovallée 655 avenue de l'Europe Montbonnot 38334 Saint Ismier Cedex Publisher Inria Domaine de Voluceau -Rocquencourt BP 105 -78153 Le Chesnay Cedex inria.fr ISSN, pp.133-148, 2004.