Program Analysis and Specialization for the C Programming Language, 1994. ,
ABCD: eliminating array bounds checks on demand, Proceedings of Conference on Programming Language Design and Implementation, pp.321-333, 2000. ,
Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic, Proceedings of Static Analysis Symposium, pp.182-203, 2006. ,
DOI : 10.1007/11823230_13
Efficient and extensible security enforcement using dynamic data flow analysis, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.39-50, 2008. ,
DOI : 10.1145/1455770.1455778
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.1548
Automatic construction of sparse data flow evaluation graphs, Proceedings of the 18th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '91, pp.55-66, 1991. ,
DOI : 10.1145/99583.99594
Checking Cleanness in Linked Lists, Proceedings of Static Analysis Symposium, pp.115-134, 2000. ,
DOI : 10.1007/978-3-540-45099-3_7
Invited Talk Static and dynamic analysis, Proceedings of the ACM-SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering , PASTE '04, p.35, 2004. ,
DOI : 10.1145/996821.996823
On the importance of points-to analysis and other memory disambiguation methods for C programs, Proceedings of Programming Language Design and Implementation, pp.47-58, 2001. ,
Selective Runtime Memory Disambiguation in a Dynamic Binary Translator, Proceedings of European Joint Conferences on Theory and Practice of Software, pp.65-79, 2006. ,
DOI : 10.1007/11688839_6
Flow-sensitive pointer analysis for millions of lines of code, International Symposium on Code Generation and Optimization (CGO 2011), pp.289-298, 2011. ,
DOI : 10.1109/CGO.2011.5764696
Pointer analysis, Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering , PASTE '01, pp.54-61, 2001. ,
DOI : 10.1145/379605.379665
Precise flow-insensitive may-alias analysis is NP-hard, ACM Transactions on Programming Languages and Systems, vol.19, issue.1, pp.1-6, 1997. ,
DOI : 10.1145/239912.239913
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.6454
Fast and accurate static data-race detection for concurrent programs, Proceedings of International Conference on Computer Aided Verification, pp.226-239, 2007. ,
Code-pointer integrity, Proceedings of Operating Systems Design and Implementation, pp.147-163, 2014. ,
Pointer-induced aliasing: A problem classification, Proceedings of Symposium on Principles of Programming Languages, pp.93-103, 1991. ,
DOI : 10.1145/99583.99599
Parallelizing more Loops with Compiler Guided Refactoring, 2012 41st International Conference on Parallel Processing, pp.410-419, 2012. ,
DOI : 10.1109/ICPP.2012.48
Shape Analysis for Unstructured Sharing, Proceedings of Static Analysis Symposium, 2015. ,
DOI : 10.1007/978-3-662-48288-9_6
URL : https://hal.archives-ouvertes.fr/hal-01249418
Pentagons, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.796-807, 2010. ,
DOI : 10.1145/1363686.1363736
Alias Analysis by Means of a Model Checker, Proceedings of Compiler Construction, pp.3-19, 2001. ,
DOI : 10.1007/3-540-45306-7_2
Analyse des pointeurs pour le langage C, 2013. ,
URL : https://hal.archives-ouvertes.fr/pastel-00944703
Runtime checking C programs, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.2107-2114, 2015. ,
DOI : 10.1145/2695664.2695906
Dynamic analysis from the bottom up, Proceedings of International Conference on Software Engineering, 2003. ,
Dynamic points-to sets, Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering , PASTE '01, pp.66-72, 2001. ,
DOI : 10.1145/379605.379671
Approximating flow-sensitive pointer analysis using frequent itemset mining, 2015 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), pp.225-234, 2015. ,
DOI : 10.1109/CGO.2015.7054202
Validation of memory accesses through symbolic analyses, Proceedings of Object-Oriented Programming, Systems, Languages & Applications, pp.791-809, 2014. ,
Selective context-sensitivity guided by impact pre-analysis, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, pp.475-484, 2014. ,
DOI : 10.1145/2666356.2594318
Static detection of asymptotic performance bugs in collection traversals, Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.369-378, 2015. ,
Symbolic range analysis of pointers, Proceedings of the 2016 International Symposium on Code Generation and Optimization, CGO 2016, 2016. ,
DOI : 10.1145/2854038.2854050
URL : https://hal.archives-ouvertes.fr/hal-01228928
Efficient field-sensitive pointer analysis for C, Proceedings of Program Analysis for Software Tools and Engineering, pp.37-42, 2004. ,
DOI : 10.1145/996821.996835
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.2104
Wave propagation and deep propagation for pointer analysis, Proceedings of International Symposium on Code Generation and Optimization, pp.126-135, 2009. ,
The undecidability of aliasing, ACM Transactions on Programming Languages and Systems, vol.16, issue.5, pp.1467-1471, 1994. ,
DOI : 10.1145/186025.186041
Symbolic bounds analysis of pointers, array indices, and accessed memory regions, Proceedings of Programming Language Design and Implementation, pp.182-195, 2000. ,
Hybrid analysis, Proceedings of the 16th international conference on Supercomputing , ICS '02, pp.274-284, 2002. ,
DOI : 10.1145/514191.514229
Solving shape-analysis problems in languages with destructive updating, ACM Transactions on Programming Languages and Systems, vol.20, issue.1, pp.1-50, 1998. ,
DOI : 10.1145/271510.271517
Points-to analysis in almost linear time, Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '96, pp.32-41, 1996. ,
DOI : 10.1145/237721.237727
Proving Termination and Memory Safety for Programs with Pointer Arithmetic, Proceedings of International Joint Conference on Automated Reasoning, pp.208-223, 2014. ,
DOI : 10.1007/978-3-319-08587-6_15
Intrusion detection via static analysis, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.156-168, 2001. ,
DOI : 10.1109/SECPRI.2001.924296
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5910
Effective dynamic detection of alias analysis errors, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, pp.279-289, 2013. ,
DOI : 10.1145/2491411.2491439
Demand-driven context-sensitive alias analysis for Java, Proceedings of the 2011 International Symposium on Software Testing and Analysis, ISSTA '11, pp.155-165, 2011. ,
DOI : 10.1145/2001420.2001440
Region-based selective flow-sensitive pointer analysis, Proceedings of Static Analysis Symposium, pp.319-336, 2014. ,
Pointer-range analysis, Proceedings of Static Analysis Symposium Inria RESEARCH CENTRE GRENOBLE ? RHÔNE-ALPES Inovallée 655 avenue de l'Europe Montbonnot 38334 Saint Ismier Cedex Publisher Inria Domaine de Voluceau -Rocquencourt BP 105 -78153 Le Chesnay Cedex inria.fr ISSN, pp.133-148, 2004. ,