SPLASH 2014
Mon 20 - Fri 24 October 2014 Portland, Oregon, United States
Fri 24 Oct 2014 13:30 - 13:52 at Salon E - Static Analysis Chair(s): Anders Møller

The C programming language does not prevent out-of-bounds memory accesses. There exist several techniques to secure C programs; however, these methods tend to slow down these programs substantially, because they populate the binary code with runtime checks. To deal with this problem, we have designed and tested two static analyses - symbolic region and range analysis - which we combine to remove the majority of these guards. In addition to the analyses themselves, we bring two other contributions. First, we describe live range splitting strategies that improve the efficiency and the precision of our analyses. Secondly, we show how to deal with integer overflows, a phenomenon that can compromise the correctness of static algorithms that validate memory accesses. We validate our claims by incorporating our findings into AddressSanitizer. We generate SPEC CINT 2006 code that is 17% faster and 9% more energy efficient than the code produced originally by this tool. Furthermore, our approach is 50% more effective than Pentagons, a state-of-the-art analysis to sanitize memory accesses.

Fri 24 Oct

oopsla2014
13:30 - 15:00: OOPSLA - Static Analysis at Salon E
Chair(s): Anders MøllerAarhus University
oopsla2014141415020000013:30 - 13:52
Talk
Link to publication
oopsla2014141415155000013:52 - 14:15
Talk
Nimrod PartushTechnion, Eran YahavTechnion
Link to publication
oopsla2014141415290000014:15 - 14:37
Talk
Qirun ZhangThe Hong Kong University of Science and Technology, Xiao XiaoThe Hong Kong University of Science and Technology, Charles ZhangHong Kong University of Science and Technology, Hao YuanBOPU Technologies, Zhendong SuUniversity of California, Davis
Link to publication
oopsla2014141415425000014:37 - 15:00
Talk
Lucas BrutschyETH Zurich, Pietro FerraraIBM Thomas J. Watson Research Center, Peter MüllerETH Zurich
Link to publication