{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T12:39:41Z","timestamp":1762605581591},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540787907"},{"type":"electronic","value":"9783540787914"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78791-4_14","type":"book-chapter","created":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T23:13:15Z","timestamp":1207091595000},"page":"197-212","source":"Crossref","is-referenced-by-count":29,"title":["On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Logozzo","sequence":"first","affiliation":[]},{"given":"Manuel","family":"F\u00e4hndrich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"A.V. Aho","year":"1986","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools. Addison Wesley, Reading (1986)"},{"unstructured":"Bagnara, R., Hill, P.M., Zaffanella, E.: The Parma Polyhedra Library., http:\/\/www.cs.unipr.it\/ppl\/","key":"14_CR2"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Compiler Construction","author":"G. Balakrishnan","year":"2004","unstructured":"Balakrishnan, G., Reps, T.W.: Analyzing memory accesses in x86 executables. In: Duesterwald, E. (ed.) CC 2004. LNCS, vol.\u00a02985, Springer, Heidelberg (2004)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_17","volume-title":"Formal Methods for Components and Objects","author":"M. Barnett","year":"2006","unstructured":"Barnett, M., Chang, B.-Y.E., DeLine, R., Jacobs, B., Leino, K.R.M.: Boogie: A modular reusable verifier for Object-Oriented programs. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2005. LNCS, vol.\u00a04111, Springer, Heidelberg (2006)"},{"key":"14_CR5","volume-title":"PLDI 2003","author":"B. Blanchet","year":"2003","unstructured":"Blanchet, B., Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Min\u00e9, A., Monniaux, D., Rival, X.: A static analyzer for large safety-critical software. In: PLDI 2003, ACM Press, New York (2003)"},{"key":"14_CR6","volume-title":"PLDI 2003","author":"F. Bourdoncle","year":"1993","unstructured":"Bourdoncle, F.: Abstract debugging of higher-order imperative languages. In: PLDI 2003, ACM Press, New York (1993)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Static Analysis","author":"R. Claris\u00f3","year":"2004","unstructured":"Claris\u00f3, R., Cortadella, J.: The octahedron abstract domain. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol.\u00a03148, Springer, Heidelberg (2004)"},{"key":"14_CR8","volume-title":"POPL 1977","author":"P. Cousot","year":"1977","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL 1977, ACM Press, New York (1977)"},{"key":"14_CR9","volume-title":"POPL 1978","author":"P. Cousot","year":"1978","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: POPL 1978, ACM Press, New York (1978)"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1145\/949305.949332","volume-title":"OOPSLA 2003","author":"M.A. F\u00e4hndrich","year":"2003","unstructured":"F\u00e4hndrich, M.A., Leino, K.R.M.: Declaring and checking non-null types in an Object-Oriented language. In: OOPSLA 2003, pp. 302\u2013312. ACM Press, New York (2003)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_41","volume-title":"Computer Aided Verification","author":"D. Gopan","year":"2006","unstructured":"Gopan, D., Reps, T.W.: Lookahead widening. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol.\u00a04144, Springer, Heidelberg (2006)"},{"key":"14_CR12","first-page":"68","volume-title":"FSTTCS","author":"P. Granger","year":"1992","unstructured":"Granger, P.: Improving the results of static analyses programs by local decreasing iteration. In: FSTTCS, pp. 68\u201379. Springer, Heidelberg (1992)"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49727-7_12","volume-title":"Static Analysis","author":"M. Handjieva","year":"1998","unstructured":"Handjieva, M., Tzolovski, S.: Refining static analyses by trace-based partitioning using control flow. In: Levi, G. (ed.) SAS 1998. LNCS, vol.\u00a01503, Springer, Heidelberg (1998)"},{"unstructured":"ECMA Int. Standard ECMA-355, common language infrastructure (June 2006)","key":"14_CR14"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45789-5_7","volume-title":"Static Analysis","author":"B. Jeannet","year":"2002","unstructured":"Jeannet, B.: Representing and approximating transfer functions in abstract interpretation of hetereogeneous datatypes. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Leroy, X.: Bytecode verification on Java smart cards. Software - Practice and Experience (SPE)\u00a032(4) (2002)","key":"14_CR16","DOI":"10.1002\/spe.438"},{"key":"14_CR17","volume-title":"18 th IFIP Congress Topical Sessions","author":"T. Lev-Ami","year":"2004","unstructured":"Lev-Ami, T., Manevich, R., Sagiv, S.: TVLA: A system for generating abstract interpreters. In: 18 th IFIP Congress Topical Sessions, August 2004, Kluwer, Dordrecht (2004)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69738-1_21","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"F. Logozzo","year":"2007","unstructured":"Logozzo, F.: Cibai: An abstract interpretation-based static analyzer for modular analysis and verification of Java classes. In: Cook, B., Podelski, A. (eds.) VMCAI 2007. LNCS, vol.\u00a04349, Springer, Heidelberg (2007)"},{"key":"14_CR19","volume-title":"ACM SAC 2008 - OOPS","author":"F. Logozzo","year":"2008","unstructured":"Logozzo, F., F\u00e4hndrich, M.A.: Pentagons: A weakly relational abstract domain for the efficient validation of array accesses. In: ACM SAC 2008 - OOPS, ACM Press, New York (2008)"},{"key":"14_CR20","volume-title":"Bytecode 2007","author":"M.V. Hermenegildo","year":"2007","unstructured":"Hermenegildo, M.V., Mendez, M., Navas, J.: An efficient, parametric fixpoint algorithm for analysis of Java bytecode. In: Bytecode 2007, Elsevier, Amsterdam (2007)"},{"unstructured":"Microsoft Inc. Visual C#. http:\/\/msdn2.microsoft.com\/-us\/vcsharp\/","key":"14_CR21"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44978-7_10","volume-title":"Programs as Data Objects","author":"A. Min\u00e9","year":"2001","unstructured":"Min\u00e9, A.: A new numerical abstract domain based on difference-bounds matrices. In: Danvy, O., Filinski, A. (eds.) PADO 2001. LNCS, vol.\u00a02053, Springer, Heidelberg (2001)"},{"unstructured":"Min\u00e9, A.: Weakly Relational Numerical Abstract Domains. PhD thesis, \u00c9cole Polytechnique (2004)","key":"14_CR23"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11609773_23","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"A. Min\u00e9","year":"2005","unstructured":"Min\u00e9, A.: Symbolic methods to enhance the precision of numerical abstract domains. In: Emerson, E.A., Namjoshi, K.S. (eds.) VMCAI 2006. LNCS, vol.\u00a03855, Springer, Heidelberg (2005)"},{"issue":"3","key":"14_CR25","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.scico.2004.08.007","volume":"57","author":"K. Palacz","year":"2005","unstructured":"Palacz, K., Baker, J., Flack, C., Grothoff, C., Yamauchi, J., Vitek, H.: Engineering a common intermediate representation for Ovm framework. The Science of Computer Programming\u00a057(3), 357\u2013378 (2005)","journal-title":"The Science of Computer Programming"},{"unstructured":"RopasWork, Inc. Airac5, http:\/\/ropas.snu.ac.kr\/airac5\/","key":"14_CR26"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11609773_7","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Rossignoli","year":"2005","unstructured":"Rossignoli, S., Spoto, F.: Detecting non-cyclicity by abstract compilation into boolean functions. In: Emerson, E.A., Namjoshi, K.S. (eds.) VMCAI 2006. LNCS, vol.\u00a03855, Springer, Heidelberg (2005)"},{"key":"14_CR28","volume-title":"PLDI 2004","author":"A. Venet","year":"2004","unstructured":"Venet, A., Brat, G.P.: Precise and efficient static array bound checking for large embedded c programs. In: PLDI 2004, ACM Press, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78791-4_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:22:25Z","timestamp":1619522545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78791-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540787907","9783540787914"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78791-4_14","relation":{},"subject":[]}}