Disclaimer The following material is covered by copyrights. The online versions are provided only for personal use. Permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the copyright owner (IEEE, or ACM or the authors)

 

Pointer Analysis Software  
   

 
 

[1]      

MIT Program Analysis Group, SPAN Website.  

Survey and Benchmarks  
   

 
 

[1]      

C. Lee, M. Potkonjak, and W. H. Mangione-Smith, ``Mediabench: A tool for evaluating and synthesizing multimedia and communications systems,'' in Micro 30, 1997.
 

[2]      

Michael Hind and Anthony Pioli, ``Which pointer analysis should I use?,'' in International Symposium on Software Testing and Analysis, 2000, pp. 113-123.
 

[3]      

Michael Hind, ``Pointer analysis: Haven't we solved this problem yet,'' in ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE), June 2001.
 

[4]      

Venkatesan T. Chakaravarthy, ``New results on the computability and complexity of points-to analysis,'' in Proceedings of Priciple of Programming Languages (POPL'03), January 2003.
 

[5]      

``SPEC CPU2000 benchmarks,'' .  
 

[6]      

Barbara Ryder, ``Prolangs analysis framework,'' .  
 

[7]      

L. Hendren et al, ``Mccat compiler project,'' .  

BDD-Based Pointer Analysis  
   

 
 

[1]      

Jianwen Zhu, ``Symbolic pointer analysis,'' in Proceedings of the International Conference on Computer Aided Design, San Jose, California, November 2002.
 

[2]      

Marc Berndl, Ondrej Lhoták, Feng Qian, Laurie Hendren, and Navindra Umanee, ``Point-to analysis using BDD,'' in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, San Diego, June 2003.
 

[3]      

Ondrej Lhoták and Laurie Hendren, ``Jedd: A BDD-based relational extension of Java,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, June 2004.
 

[4]      

John Whaley and Monica Lam, ``Cloning-based context-sensitive pointer alias analysis using binary decision diagrams,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, June 2004.
 

[5]      

Jianwen Zhu and Silvian Calman, ``Symbolic pointer analysis revisited,'' in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, Washington DC, June 2004.
 

[6]      

Jianwen Zhu and Silvian Calman, ``Context-sensitive symbolic pointer analysis,'' IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 24, no. 4, Apr. 2005.
 

[7]      

Jianwen Zhu, ``Towards scalable flow and context-sensitive symbolic pointer analysis,'' in Proceedings of the Design Automation Conference, Anaheim, California, June 2005.

Flow Insensitive Context Insensitive Analysis  
   

 
 

[1]      

Las O. Andersen, Program Analysis and Specialization for the C Programming Language, Ph.D. thesis, Computer Science Department, University of Copenhagen, 1994.
 

[2]      

Bjarne Steensgaard, ``Points-to analysis in almost linear time,'' in Proceedings of Symposium on Principles of Programming Languages, 1996, pp. 32-41.
 

[3]      

Marc Shapiro II and Susan Horwitz, ``Fast and accurate flow-insensitive points-to analysis,'' in Proceedings of Symposium on Principles of Programming Languages, 1997, pp. 1-14.
 

[4]      

Manuel Fähndrich, Jeffrey S. Foster, Zhendong Su, and Alexander Aiken, ``Partial online cycle elimination in inclusion constraint graphs,'' ACM SIGPLAN Notices, vol. 33, no. 5, pp. 85-96, 1998.
 

[5]      

Michael Hind, Michael Burke, Paul Carini, and Jong-Deok Choi, ``Interprocedural pointer alias analysis,'' ACM Transactions on Programming Languages and Systems, vol. 21, no. 4, pp. 848-894, 1999.
 

[6]      

N. Heintze, ``Analysis of large code bases: The compile-link-analyze model,'' 1999.
 

[7]      

Donglin Liang, Maikel Pennings, and Mary Jean Harrold, ``Extending and evaluating flow-insensitive and context-insensitive points-to analyses for java,'' in Workshop on Program Analysis For Software Tools and Engineering, 2001, pp. 73-79.
 

[8]      

Nevin Heintze and Olivier Tardieu, ``Ultra-fast aliasing analysis using CLA: A million lines of C code in a second,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, 2001, pp. 254-263.

Flow Sensitive Context Insensitive Analysis  
   

 
 

[1]      

Michael Hind and Anthony Pioli, ``Assessing the effects of flow-sensitivity on pointer alias analyses,'' in Proceedings of Static Analysis Symposium, 1998, pp. 57-81.
 

[2]      

Rebecca Hasti and Susan Horwitz, ``Using static single assignment form to improve flow-insensitive pointer analysis,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, 1998, pp. 97-105.

Flow Insensitive Context Sensitive Analysis  
   

 
 

[1]      

W. Landi and B. Ryder, ``A safe approximate algorithm for inter-procedural pointer aliasing,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, June 1992, pp. 235-248.
 

[2]      

R. Chatterjee, B. G. Ryder, and W. A. Landi, ``Relevant context inference,'' in Proceedings of Symposium on Principles of Programming Languages, 1999, pp. 133-146.
 

[3]      

Ben-Chung Cheng and Wen-Mei W. Hwu, ``Modular interprocedural pointer analysis using access paths: Design implementation and evaluation,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, Vancouver, British Columbia, Canada, June 2000, pp. 57-69.
 

[4]      

Manuvir Das, ``Unification-based pointer analysis with directional assignments,'' ACM SIGPLAN Notices, vol. 35, no. 5, pp. 35-46, 2000.
 

[5]      

Atanas Rountev and Satish Chandra, ``Off-line variable substitution for scaling points-to analysis,'' ACM SIGPLAN Notices, vol. 35, no. 5, pp. 47-56, 2000.
 

[6]      

A. Rountev, A. Milanova, and B. Ryder, ``Points-to analysis for java based on annotated constraints,'' 2000.
 

[7]      

J. S. Foster, M. Fähndrich, and A. Aiken, ``Polymorphic versus monomorphic flow-insensitive points-to analysis for C,'' in Proceedings of Static Analysis Symposium, June 2000, pp. 175-198.
 

[8]      

Donglin Liang and Mary Jean Harrold, ``Efficient computation of parameterized pointer information for interprocedural analyses,'' in Proceedings of Static Analysis Symposium, 2001, pp. 279-298.
 

[9]      

A. Milanova, A. Rountev, and B. Ryder, ``Parameterized object-sensitivity for points-to and side-effect analysis for Java,'' in Proceedings of International Symposium on Software Testing and Analysis, 2000, pp. 1-12.

Flow Sensitive Context Sensitive Analysis  
   

 
 

[1]      

Jong-Deok Choi, Michael Burke, and Paul Carini, ``Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects,'' in Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Charleston, South Carolina, 1993, pp. 232-245.
 

[2]      

Maryam Emami, Rakesh Ghiya, and Laurie J. Hendren, ``Context-sensitive interprocedural points-to analysis in the presence of function pointers,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, 1994, pp. 242-256.
 

[3]      

R. Wilson and M. Lam, ``Efficient context-sensitive pointer analysis for C programs,'' in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, June 1995, pp. 1-12.
 

[4]      

Radu Rugina and Martin C. Rinard, ``Pointer analysis for multithreaded programs,'' in SIGPLAN Conference on Programming Language Design and Implementation, 1999, pp. 77-90.
 

[5]      

Barbara G. Ryder, William A. Landi, Philip A. Stocks, Sean Zhang, and Rita Altucher, ``A schema for interprocedural modification side-effect analysis with pointer aliasing,'' ACM Transactions on Programming Languages and Systems, vol. 23, no. 2, pp. 105-186, 2001.
 

[6]      

Frédéric Vivien and Martin C. Rinard, ``Incrementalized pointer and escape analysis,'' in SIGPLAN Conference on Programming Language Design and Implementation, 2001, pp. 35-46.
 

[7]      

Jeffrey S. Foster, Tachio Terauschi, and Alex Aiken, ``Flow-sensitive type qualifiers,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, Berlin, June 2002.
 

[8]      

David L. Heine and Monica Lam, ``A practical flow-sensitive and context-sensitive c and c++ memory leak detector,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, San Diego, June 2003.
 

[9]      

Alex Aiken, Jeffrey S. Foster, John Kodumal, and Tachio Terauschi, ``Checking and inferring local non-aliasing,'' in Proceedings of SIGPLAN Conference on Programming Language Design and Implementation, San Diego, June 2003.

Program Slicing  
   

 

Hardware Synthesis with Pointer Analysis  
   

 
 

[1]      

L. Semeria and G. De Micheli, ``Resolution, optimization, and encoding of pointer variables for the behavioral synthesis from C,'' IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, February 2001.
 

[2]      

L. Semeria, K. Sata, and G. De Micheli, ``Synthesis of hardware models in C with pointers and complex data structures,'' IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, February 2001.
 

[3]      

P. Panda, L. Semeria, and G. De Micheli, ``Cache-efficient memory layout of aggregate data structures,'' in Proceedings of the International Symposium on System Synthesis, September 2001.
 

[4]      

J. Zhu, ``Color permutation: an iterative algorithm for memory packing,'' Tech. Rep. CE-01-04-01, Electrical and Computer Engineering, University of Toronto, April 2001.