• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xia Yimin, Luo Jun, and Zhang Minxuan. Detecting Out-of-Bounds Accesses with Conditional Range Constraint[J]. Journal of Computer Research and Development, 2006, 43(10): 1760-1766.
Citation: Xia Yimin, Luo Jun, and Zhang Minxuan. Detecting Out-of-Bounds Accesses with Conditional Range Constraint[J]. Journal of Computer Research and Development, 2006, 43(10): 1760-1766.

Detecting Out-of-Bounds Accesses with Conditional Range Constraint

More Information
  • Published Date: October 14, 2006
  • Out-of-bounds accesses can lead to nondeterministic behaviors. Proposed in this paper is a novel detection method based on conditional range constraint. It divides the detection process into two phrases: the constraint generation phase and the constraint resolution phase. In the phase of constraint generation, a flow-sensitive, inter-procedure algorithm is proposed to propagate range constraints and value constraints respectively. In the constraint resolution phase, a linear programming solver is used to determine the bounds of abstract memory locations and the offset. The experiment results show that the method proposed is effective, and its precision is higher than 80%.
  • Related Articles

    [1]Zheng Yingying, Zhou Junlong, Shen Yufan, Cong Peijin, Wu Zebin. Time and Energy-Sensitive End-Edge-Cloud Resource Provisioning Optimization Method for Collaborative Vehicle-Road Systems[J]. Journal of Computer Research and Development, 2023, 60(5): 1037-1052. DOI: 10.7544/issn1000-1239.202220734
    [2]Han Meiling, Sun Shining, Deng Qingxu. Schedulability Analysis of Parallel Tasks Under Global Limited Preemption on Heterogeneous Multi-Cores[J]. Journal of Computer Research and Development, 2023, 60(5): 992-1001. DOI: 10.7544/issn1000-1239.202220711
    [3]Ge Yongqi, Dong Yunwei, Gu Bin. Preemption Threshold Scheduling for Energy Harvesting Based Cyber-Physical Systems[J]. Journal of Computer Research and Development, 2015, 52(12): 2695-2706. DOI: 10.7544/issn1000-1239.2015.20150745
    [4]Fu Ning, Du Chenglie, Li Jianliang, Liu Zhiqiang, Peng Han. Analysis and Verification of AADL Hierarchical Schedulers[J]. Journal of Computer Research and Development, 2015, 52(1): 167-176. DOI: 10.7544/issn1000-1239.2015.20130722
    [5]Ding Wanfu, Guo Ruifeng, Qin Chenggang, Guo Fengzhao. A Fault-Tolerant Scheduling Algorithm with Software Fault Tolerance in Hard Real-Time Systems[J]. Journal of Computer Research and Development, 2011, 48(4): 691-698.
    [6]He Xiaochuan and Jia Yan. FPTS: A Fixed-Priority Preemption Threshold Scheduling Algorithm in the Presence of Resources Sharing[J]. Journal of Computer Research and Development, 2009, 46(2): 302-309.
    [7]Luo Wei, Yang Fumin, Pang Liping, and Li Jun. A Real-Time Fault-Tolerant Scheduling Algorithm for Distributed Systems Based on Deferred Active Backup-Copy[J]. Journal of Computer Research and Development, 2007, 44(3).
    [8]Lee Yong, Luo Junzhou, Wu Jun. A High-Throughput Scheduling Algorithm with Small Crosspoint Buffers for CICQ Switches[J]. Journal of Computer Research and Development, 2006, 43(12): 2033-2040.
    [9]Xing Jiansheng, Liu Junxiang, Wang Yongji. Schedulability Test Performance Analysis of Rate Monotonic Algorithm and Its Extended Ones[J]. Journal of Computer Research and Development, 2005, 42(11): 2025-2032.
    [10]Wang Qiang, Wang Hongan, Jin Hong, Fu Yong, and Dai Guozhong. A Concurrency Control Protocol for Scheduling Mixed Real-Time Transactions[J]. Journal of Computer Research and Development, 2005, 42(1): 18-29.

Catalog

    Article views (484) PDF downloads (745) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return