Affiliation:
1. Ghent University, Gent, Belgium
Abstract
Existing algorithms for computing dominators are formulated for control flow graphs of single procedures. With the rise of computing power, and the viability of whole-program analyses and optimizations, there is a growing need to extend the dominator computation algorithms to context-sensitive interprocedural dominators. Because the transitive reduction of the interprocedural dominator graph is not a tree, as in the intraprocedural case, it is not possible to extend existing algorithms directly. In this article, we propose a new algorithm for computing interprocedural dominators. Although the theoretical complexity of this new algorithm is as high as that of a straightforward iterative solution of the data flow equations, our experimental evaluation demonstrates that the algorithm is practically viable, even for programs consisting of several hundred thousands of basic blocks.
Publisher
Association for Computing Machinery (ACM)
Reference21 articles.
1. Aho A. V. and Ullman J. D. 1977. Principles of Compiler Design. Addison-Wesley Reading MA. Aho A. V. and Ullman J. D. 1977. Principles of Compiler Design. Addison-Wesley Reading MA.
2. Dominators in Linear Time
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SysPart: Automated Temporal System Call Filtering for Binaries;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. Fuzzing Embedded Systems using Debug Interfaces;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
3. Flexible software protection;Computers & Security;2022-05
4. Low-deterministic security for low-nondeterministic programs1;Journal of Computer Security;2018-04-09
5. On Improvements of Low-Deterministic Security;Lecture Notes in Computer Science;2016