Access-based localization with bypassing

Hakjoo Oh, Kwangkeun Yi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)


We present an extension of access-based localization technique to mitigate a substantial inefficiency in handling procedure calls. Recently, access-based localization was proposed as an effective way of tightly localizing abstract memories. However, it has a limitation in handling procedure calls: the localized input memory for a procedure contains not only memory locations accessed by the procedure but also those accessed by transitively called procedures. The weakness is especially exacerbated in the presence of recursive call cycles, which is common in analysis of realistic programs. In this paper, we present a technique, called bypassing, that mitigates the problem. Our technique localizes input memory states only with memory locations that the procedure directly accesses. Those parts not involved in analysis of the procedure are bypassed to transitively called procedures. In experiments with an industrial-strength global C static analyzer, the technique reduces the average analysis time by 42%. In particular, the technique is especially effective for programs that extensively use recursion: it saves analysis time by 77% on average.

Original languageEnglish
Title of host publicationProgramming Languages and Systems - 9th Asian Symposium, APLAS 2011, Proceedings
Number of pages16
Publication statusPublished - 2011
Externally publishedYes
Event9th Asian Symposium on Programming Languages and Systems, APLAS 2011 - Kenting, Taiwan, Province of China
Duration: 2011 Dec 52011 Dec 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7078 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference9th Asian Symposium on Programming Languages and Systems, APLAS 2011
Country/TerritoryTaiwan, Province of China

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Access-based localization with bypassing'. Together they form a unique fingerprint.

Cite this