[1] Engler D, Chelf B, Chou A, et al. Checking system rules using system-specific, programmer-written compiler extensions//OSDI 2000. San Diego: , 2000:1-16. [2] Ashcraft K, Engler D. Using programmer-written com-piler extensions to catch security holes//IEEE Symposium on Security and Privacy. Washington: IEEE CS, 2002: 143-159. [3] Hovemeyer D, Pugh W. Finding bugs is easy[J]. ACM SIGPLAN Notices, 2004, 39(12): 92-106. [4] 杨朝红, 宫云战, 肖庆, 等. 基于软件缺陷模型的测试系统[J]. 北京邮电大学学报, 2008, 20(12): 1-6. Yang Zhaohong, Gong Yunzhan, Xiao Qing, et al. A defect based model testing system[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 20(12): 1-6. [5] Hallem S, Chelf B, Xie Yichen, et al. A system and language for building system-specific, static analyses //PLDI 2002. Berlin: , 2002: 69-82. [6] Das M, Lerner S, Seigle M. Path-sensitive program verification in polynomial time //PLDI 2002. Berlin: , 2002: 57-68. [7] 肖庆, 宫云战, 杨朝红. 一种路径敏感的静态缺陷检测方法[J]. 软件学报, 2010, 21(2): 209-217. Xiao Qing, Gong Yunzhan, Yang Zhaohong. Path sensitive static defect detecting method[J]. Journal of Software, 2010, 21(2): 209-217. [8] John P B. An efficient way to find the side effects of procedure calls and the aliases of variables//POPL 1979. New York: ACM, 1979: 29-41. [9] Cooper K D, Kennedy K. Interprocedural side-effect analysis in linear time[J]. ACM SIGPLAN Notice, 1988, 23(7): 57-66. [10] Cooper K D, Kennedy K. Efficient computation of flow-insensitive interprocedural summary information a correction[J]. ACM SIGPLAN Notice, 1988, 23(4): 35-42. [11] William L, Barbara G R, Sean Z. Interprocedural modification side effect analysis with pointer aliasing[J]. ACM SIGPLAN Notices, 1993, 28(6): 56-67. |