Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Pointer analysis" patented technology

In computer science, pointer analysis, or points-to analysis, is a static code analysis technique that establishes which pointers, or heap references, can point to which variables, or storage locations. It is often a component of more complex analyses such as escape analysis. A closely related technique is shape analysis.

Method of fully detecting null pointer reference defects

InactiveCN103218296ASolve the problem of false positivesAchieve zero false negativesSoftware testing/debuggingInterval arithmeticTheoretical computer science
The invention discloses a method of fully detecting null pointer reference defects. The method comprises recognizing all addressable expressions of an application to be detected based on an abstract syntax tree; carrying out conservative interval arithmetic and pointer analysis on the application to be detected according to a control flow diagram, and generating a procedural summary according to results of the interval arithmetic and the pointer analysis; recognizing all pointer reference and referred pointers according to the procedural summary and the abstract syntax tree, and creating a null pointer reference defect state machine example on each referred pointer; and running the null pointer reference defect state machine examples based on the control flow diagram, carrying out state transition on each defect state machine example on each node of the control flow diagram according to the results of the interval arithmetic and the pointer analysis, and carrying out null pointer reference detection. By adopting the method of fully detecting the null pointer reference defects, the problem of failing to report the null pointer reference defects can be effectively solved, and zero omission and low misinformation of the null pointer reference defect detection are achieved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Breakdown automatically-positioning method for null pointer abnormity

InactiveCN102981953AOvercome the flaw of imprecise analysis resultsSoftware testing/debuggingTime informationAlgorithm
The invention relates to a breakdown automatically-positioning method for a null pointer abnormity. The method includes the three steps: (1) slicing a procedure, (2) positioning a breakdown, null pointer analyzing and alias analyzing the procedure after slicing, (3) being visualized. The method of combining a static analysis and real-time information stacking is adopted, a source of the null pointer abnormity is led out through automatic positioning, the shortcomings that analyzing results are not accurate due to the single use of the static analysis method, and the real-time information stacking is too tough and cannot be independently applied are overcome, and meanwhile dynamic information can be collected with no price is paid.
Owner:CHINA UNIV OF MINING & TECH

Assembly level interprocedual pointer analysis method based on speculative multithreading

The invention discloses an assembly level interprocedual pointer analysis method based on speculative multithreading. Through assembly level interprocedual points-to analysis, a procedure call graph of all processes is established in a source program before the interprocedual points-to analysis is carried out, and after establishment, points-to analysis is carried out in two stages. The method comprises: in the first stage, firstly, establishing a path profiling cost model based on probability, extracting speculative paths selected by all process nodes in the procedure call graph, and then performing points-to analysis in a process; in the second stage, performing interprocedual points-to analysis and interprocedual side-effect calculation, on each process calling point, performing mappingand inverse mapping on points-to relations using a points-to analysis result in a process, to obtain an interprocedual side-effect calculation result, and realize context points-to relation update ofa calling procedure. On this basis, the method guides a whole procedure to perform interprocedual data flow analysis, evaluates data dependence degree among pointer variable memory points-to relations, and obtains a more accurate thread partitioning result.
Owner:XIAN AERONAUTICAL UNIV

Method for intelligently detecting C program memory leakage based on machine learning

ActiveCN108804332AThe classifier results are accurateQuick checkSoftware testing/debuggingData setThree stage
The invention discloses a method for intelligently detecting C program memory leakage based on machine learning. The method has three stages; in a model construction stage, two data sets are constructed according to original memory leakage; memory leakage characteristics are extracted respectively from the two data sets; the memory leakage characteristics are input into a machine learning classifier, so that training and cross validation are carried out; the type and the parameter of the classifier are modified; the memory leakage is detected by taking the classifier having highest classification accuracy rate as the classifier model; in a program analysis and characteristic obtaining stage, a source program is pre-analyzed; all memory allocation points o are obtained; then, pointer analysis is carried out; a VFG (Value Flow Graph) at the beginning of o is constructed; the memory leakage characteristics corresponding to each path in the VFG are extracted; in a defect detection and report stage, the memory leakage characteristics in the program analysis and characteristic obtaining stage are input into the classifier model in the model construction stage and detected; whether memoryleakage exists in a path at the beginning of o or not is judged; and thus, a memory leakage report is obtained.
Owner:NANJING UNIV

Pointer analysis method based on offline constraint graph

The present invention discloses a pointer analysis method based on an offline constraint graph. The method comprises two phases: an offline analysis phase and an online analysis phase. In the offline analysis phase, ADD firstly constructs an offline constraint graph, next defines and calculates an ancestor set and a descendant set for each node in the offline constraint graph, then calculates a domination tree corresponding to the offline constraint graph, and based on domination node information, calculates equivalent top-layer variable pair information of a pointer. In the online analysis phase, the ADD performs online cycle detection by using the ancestor set and the descendant set of the node on the one hand, and reduces spreading overheads of inter-node point information in an analysis process by using the equivalent top-layer variable pair information of the pointer on the other hand. Compared with the conventional LCD based on the contained pointer analysis method, the ADD is capable of improving pointer analysis efficiency without affecting precision of the point information.
Owner:SOUTHEAST UNIV

A Method to Sufficiently Detect Null Pointer Reference Defects

The invention discloses a method of fully detecting null pointer reference defects. The method comprises recognizing all addressable expressions of an application to be detected based on an abstract syntax tree; carrying out conservative interval arithmetic and pointer analysis on the application to be detected according to a control flow diagram, and generating a procedural summary according to results of the interval arithmetic and the pointer analysis; recognizing all pointer reference and referred pointers according to the procedural summary and the abstract syntax tree, and creating a null pointer reference defect state machine example on each referred pointer; and running the null pointer reference defect state machine examples based on the control flow diagram, carrying out state transition on each defect state machine example on each node of the control flow diagram according to the results of the interval arithmetic and the pointer analysis, and carrying out null pointer reference detection. By adopting the method of fully detecting the null pointer reference defects, the problem of failing to report the null pointer reference defects can be effectively solved, and zero omission and low misinformation of the null pointer reference defect detection are achieved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Probabilistic pointer analysis method using ssa form

A computer-implemented probabilistic pointer analysis method using SSA form comprises the steps of: evaluating a program in an SSA form comprising a target pointer to determine pointer relations between the target pointer, a plurality of aliased pointers related to the target pointer and at least a probable location of the target pointer; and generating a direct probabilistic relation between the target pointer and the at least a probable location of the target pointer according to the pointer relation.
Owner:NATIONAL TSING HUA UNIVERSITY

Java null pointer analysis system based on constant value arrival analysis method

The invention relates to the field of software static analysis, in particular to a Java null pointer analysis system based on a fixed value arrival analysis method. The system comprises a project module, a filter module, a source code module, a console module, a null pointer analysis module and a result display module. According to the system, a developer can be helped to timely discover suspectedsource code lines with null pointer abnormity in a source code in a development process. Through the tool, the source codes can be directly displayed and jumped to suspected abnormal source code lines, developers can check and analyze the source codes more conveniently and visually, accordingly, the corresponding source codes can be modified, the source code structure is further perfected, the readability of the source codes is enhanced, a better source code style is formed, and a more perfect software system is developed.
Owner:SUN YAT SEN UNIV

System suitable for analysis control of AU/TU pointer

The invention discloses a system suitable for the analysis control of an AU/TU pointer, which comprises the sub-block of a pointer analysis state machine, a pointer type state machine and an I/D bit inversion detection module, wherein the pointer type state machine is used for judging and outputting the type of state indication according to the current pointer value; the I/D bit inversion detection module is used for indicating the adjustment indication type of the pointer; the pointer analysis LOP/AIS/NORMAL state machine sub-block uses the pointer type which is generated by the pointer analysis state machine as the basis to carry out the state skip and output pointer loss state indication and alarm state indication; the initial state in the resetting course is used as the loss state of the pointer; and the pointer value updating sub-block updates the value of the pointer and outputs positive adjustment indication signals, negative adjustment indication signals and new pointer adjustment indication signals according to the positive and negative adjustment indication and new data pointer adjustment indication which are generated by the pointer analysis state machine. The system disclosed by the invention solves the dispersity of the existing pointer analysis treatment of an SDH (synchronous digital hierarchy).
Owner:LIUZHOU DADI TELECOMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products