Team for Research in
Ubiquitous Secure Technology

How is Aliasing Used in Systems Software?
B. Hackett, A. Aiken

Citation
B. Hackett, A. Aiken. "How is Aliasing Used in Systems Software?". International Symposium on Foundations of Software Engineering, 69-80, November, 2006.

Abstract
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We nd that aliasing has a great deal of structure in real programs and that just nine programming idioms account for nearly all aliasing in our study. Our study requires an automatic alias analysis that both scales to large systems and has a low false positive rate. To this end, we also present a new context-, ow-, and partially path-sensitive alias analysis that, together with a new technique for object naming, achieves a false aliasing rate of 26.2% on our benchmarks.

Electronic downloads

Citation formats  
  • HTML
    B. Hackett, A. Aiken. <a
    href="http://www.truststc.org/pubs/614.html"
    >How is Aliasing Used in Systems Software?</a>,
    International Symposium on Foundations of Software
    Engineering, 69-80, November, 2006.
  • Plain text
    B. Hackett, A. Aiken. "How is Aliasing Used in Systems
    Software?". International Symposium on Foundations of
    Software Engineering, 69-80, November, 2006.
  • BibTeX
    @inproceedings{HackettAiken06_HowIsAliasingUsedInSystemsSoftware,
        author = {B. Hackett and A. Aiken},
        title = {How is Aliasing Used in Systems Software?},
        booktitle = {International Symposium on Foundations of Software
                  Engineering},
        pages = {69-80},
        month = {November},
        year = {2006},
        abstract = {We present a study of all sources of aliasing in
                  over one million lines of C code, identifying in
                  the process the common patterns of aliasing that
                  arise in practice. We nd that aliasing has a
                  great deal of structure in real programs and that
                  just nine programming idioms account for nearly
                  all aliasing in our study. Our study requires an
                  automatic alias analysis that both scales to large
                  systems and has a low false positive rate. To this
                  end, we also present a new context-, ow-, and
                  partially path-sensitive alias analysis that,
                  together with a new technique for object naming,
                  achieves a false aliasing rate of 26.2% on our
                  benchmarks.},
        URL = {http://www.truststc.org/pubs/614.html}
    }
    

Posted by Jessica Gamble on 18 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.