{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:03:11Z","timestamp":1773824591149,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":76,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642369452","type":"print"},{"value":"9783642369469","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36946-9_8","type":"book-chapter","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T22:18:49Z","timestamp":1363817929000},"page":"196-232","source":"Crossref","is-referenced-by-count":47,"title":["Alias Analysis for Object-Oriented Programs"],"prefix":"10.1007","author":[{"given":"Manu","family":"Sridharan","sequence":"first","affiliation":[]},{"given":"Satish","family":"Chandra","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Dolby","sequence":"additional","affiliation":[]},{"given":"Stephen J.","family":"Fink","sequence":"additional","affiliation":[]},{"given":"Eran","family":"Yahav","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-49538-X_2","volume-title":"ECOOP \u201995 - Object-Oriented Programming","author":"O. Agesen","year":"1995","unstructured":"Agesen, O.: The Cartesian Product Algorithm: Simple and Precise Type Inference of Parametric Polymorphism. In: Olthoff, W. (ed.) ECOOP 1995. LNCS, vol.\u00a0952, pp. 2\u201326. Springer, Heidelberg (1995)"},{"key":"8_CR2","volume-title":"Compilers: Principles, Techniques, & Tools with Gradiance","author":"A.V. Aho","year":"2007","unstructured":"Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, & Tools with Gradiance, 2nd edn. Addison-Wesley Publishing Company, USA (2007)","edition":"2"},{"key":"8_CR3","unstructured":"Andersen, L.O.: Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, DIKU (1994)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bacon, D., Sweeney, P.: Fast static analysis of C++ virtual function calls. In: Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), San Jose, CA (October 1996)","DOI":"10.1145\/236337.236371"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/11823230_15","volume-title":"Static Analysis","author":"G. Balakrishnan","year":"2006","unstructured":"Balakrishnan, G., Reps, T.: Recency-Abstraction for Heap-Allocated Storage. In: Yi, K. (ed.) SAS 2006. LNCS, vol.\u00a04134, pp. 221\u2013239. Springer, Heidelberg (2006)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Berndl, M., Lhot\u00e1k, O., Qian, F., Hendren, L., Umanee, N.: Points-to analysis using BDDs. In: Conference on Programming Language Design and Implementation (PLDI) (June 2003)","DOI":"10.1145\/781143.781144"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1640089.1640108","volume-title":"Proceeding of the 24th ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2009","author":"M. Bravenboer","year":"2009","unstructured":"Bravenboer, M., Smaragdakis, Y.: Strictly declarative specification of sophisticated points-to analyses. In: Proceeding of the 24th ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2009, pp. 243\u2013262. ACM, New York (2009)"},{"key":"8_CR8","first-page":"296","volume-title":"Conference on Programming Language Design and Implementation (PLDI)","author":"D.R. Chase","year":"1990","unstructured":"Chase, D.R., Wegman, M., Zadeck, F.: Analysis of pointers and structures. In: Conference on Programming Language Design and Implementation (PLDI), pp. 296\u2013310. ACM Press, New York (1990)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Choi, J.-D., Burke, M., Carini, P.: Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects. In: POPL, pp. 232\u2013245 (1993)","DOI":"10.1145\/158511.158639"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/BFb0058022","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"E.M. Clarke","year":"1997","unstructured":"Clarke, E.M.: Model Checking. In: Ramesh, S., Sivakumar, G. (eds.) FST TCS 1997. LNCS, vol.\u00a01346, pp. 54\u201356. Springer, Heidelberg (1997)"},{"key":"8_CR11","first-page":"269","volume-title":"ACM Symposium on Principles of Programming Languages (POPL)","author":"P. Cousot","year":"1979","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: ACM Symposium on Principles of Programming Languages (POPL), pp. 269\u2013282. ACM Press, New York (1979)"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/512529.512538","volume-title":"Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, PLDI 2002","author":"M. Das","year":"2002","unstructured":"Das, M., Lerner, S., Seigle, M.: ESP: path-sensitive program verification in polynomial time. In: Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, PLDI 2002, pp. 57\u201368. ACM, New York (2002)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-49538-X_5","volume-title":"ECOOP \u201995 - Object-Oriented Programming","author":"J. Dean","year":"1995","unstructured":"Dean, J., Grove, D., Chambers, C.: Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In: Olthoff, W. (ed.) ECOOP 1995. LNCS, vol.\u00a0952, pp. 77\u2013101. Springer, Heidelberg (1995)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Dor, N., Adams, S., Das, M., Yang, Z.: Software validation via scalable path-sensitive value flow analysis. In: ISSTA, pp. 12\u201322 (2004)","DOI":"10.1145\/1007512.1007515"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/178243.178264","volume-title":"PLDI 1994: Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation","author":"M. Emami","year":"1994","unstructured":"Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: PLDI 1994: Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation, pp. 242\u2013256. ACM Press, New York (1994)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"F\u00e4hndrich, M., Rehof, J., Das, M.: Scalable context-sensitive flow analysis using instantiation constraints. In: Conference on Programming Language Design and Implementation (PLDI) (2000)","DOI":"10.1145\/349299.349332"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"F\u00e4ndrich, M., Foster, J.S., Su, Z., Aiken, A.: Partial online cycle elimination in inclusion constraint graphs. In: Conference on Programming Language Design and Implementation (PLDI), Montreal, Canada (June 1998)","DOI":"10.1145\/277650.277667"},{"issue":"4","key":"8_CR18","first-page":"304","volume":"5","author":"C. Fecht","year":"1998","unstructured":"Fecht, C., Seidl, H.: Propagating differences: an efficient new fixpoint algorithm for distributive constraint systems. Nordic J. of Computing\u00a05(4), 304\u2013329 (1998)","journal-title":"Nordic J. of Computing"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/2048066.2048078","volume-title":"Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2011","author":"A. Feldthaus","year":"2011","unstructured":"Feldthaus, A., Millstein, T., M\u00f8ller, A., Sch\u00e4fer, M., Tip, F.: Tool-supported refactoring for JavaScript. In: Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2011, pp. 119\u2013138. ACM, New York (2011)"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1348250.1348255","volume":"17","author":"S.J. Fink","year":"2008","unstructured":"Fink, S.J., Yahav, E., Dor, N., Ramalingam, G., Geay, E.: Effective typestate verification in the presence of aliasing. ACM Transactions on Software Engineering and Methodology\u00a017(2), 1\u201334 (2008)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"6","key":"8_CR21","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1145\/506315.506316","volume":"23","author":"D. Grove","year":"2001","unstructured":"Grove, D., Chambers, C.: A framework for call graph construction algorithms. ACM Trans. Program. Lang. Syst.\u00a023(6), 685\u2013746 (2001)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/3-540-44898-5_12","volume-title":"Static Analysis","author":"S.Z. Guyer","year":"2003","unstructured":"Guyer, S.Z., Lin, C.: Client-Driven Pointer Analysis. In: Cousot, R. (ed.) SAS 2003. LNCS, vol.\u00a02694, pp. 214\u2013236. Springer, Heidelberg (2003)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code. In: PLDI, pp. 290\u2013299 (2007)","DOI":"10.1145\/1250734.1250767"},{"key":"8_CR24","unstructured":"Heintze, N.: Analysis of Large Code Bases: The Compile-Link-Analyze Model (Draft of November 12, 1999)"},{"issue":"5","key":"8_CR25","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1145\/258916.258939","volume":"32","author":"N. Heintze","year":"1997","unstructured":"Heintze, N., McAllester, D.: Linear-time subtransitive control flow analysis. SIGPLAN Not.\u00a032(5), 261\u2013272 (1997)","journal-title":"SIGPLAN Not."},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Heintze, N., Tardieu, O.: Demand-driven pointer analysis. In: Conference on Programming Language Design and Implementation (PLDI), Snowbird, Utah (June 2001)","DOI":"10.1145\/378795.378802"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Heintze, N., Tardieu, O.: Ultra-fast aliasing analysis using CLA: A million lines of C code in a second. In: Conference on Programming Language Design and Implementation (PLDI) (June 2001)","DOI":"10.1145\/378795.378855"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1890028.1890029","volume":"33","author":"S.S. Huang","year":"2011","unstructured":"Huang, S.S., Smaragdakis, Y.: Morphing: Structurally shaping a class by reflecting on others. ACM Trans. Program. Lang. Syst.\u00a033, 6:1\u20136:44 (2011)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"6","key":"8_CR29","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s10009-011-0197-7","volume":"13","author":"N. Kidd","year":"2011","unstructured":"Kidd, N., Reps, T.W., Dolby, J., Vaziri, M.: Finding concurrency-related bugs using random isolation. STTT\u00a013(6), 495\u2013518 (2011)","journal-title":"STTT"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1145\/143095.143137","volume-title":"PLDI 1992: Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation","author":"W. Landi","year":"1992","unstructured":"Landi, W., Ryder, B.G.: A safe approximate algorithm for interprocedural aliasing. In: PLDI 1992: Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation, pp. 235\u2013248. ACM Press, New York (1992)"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1145\/1250734.1250766","volume-title":"Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007","author":"C. Lattner","year":"2007","unstructured":"Lattner, C., Lenharth, A., Adve, V.: Making context-sensitive points-to analysis with heap cloning practical for the real world. In: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007, pp. 278\u2013289. ACM, New York (2007)"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Lhot\u00e1k, O., Hendren, L.: Scaling Java points-to analysis using Spark. In: International Conference on Compiler Construction (CC), Warsaw, Poland (April 2003)","DOI":"10.1007\/3-540-36579-6_12"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Lhot\u00e1k, O., Hendren, L.: Jedd: a BDD-based relational extension of Java. In: Conference on Programming Language Design and Implementation, PLDI (2004)","DOI":"10.1145\/996841.996861"},{"key":"8_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1391984.1391987","volume":"18","author":"O. Lhot\u00e1k","year":"2008","unstructured":"Lhot\u00e1k, O., Hendren, L.: Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation. ACM Trans. Softw. Eng. Methodol.\u00a018, 3:1\u20133:53 (2008)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"8_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1377492.1377494","volume":"19","author":"O. Lhot\u00e1k","year":"2008","unstructured":"Lhot\u00e1k, O., Hendren, L.: Relations as an abstraction for BDD-based program analysis. ACM Trans. Program. Lang. Syst.\u00a019, 19:1\u201319:63 (2008)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"8_CR36","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1145\/1993498.1993567","volume-title":"Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2011","author":"P. Liang","year":"2011","unstructured":"Liang, P., Naik, M.: Scaling abstraction refinement via pruning. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2011, pp. 590\u2013601. ACM, New York (2011)"},{"key":"8_CR37","first-page":"31","volume-title":"Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011","author":"P. Liang","year":"2011","unstructured":"Liang, P., Tripp, O., Naik, M.: Learning minimal abstractions. In: Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011, pp. 31\u201342. ACM, New York (2011)"},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1145\/1869459.1869494","volume-title":"Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2010","author":"P. Liang","year":"2010","unstructured":"Liang, P., Tripp, O., Naik, M., Sagiv, M.: A dynamic evaluation of the precision of static heap abstractions. In: Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2010, pp. 411\u2013427. ACM, New York (2010)"},{"key":"8_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11575467_11","volume-title":"Programming Languages and Systems","author":"B. Livshits","year":"2005","unstructured":"Livshits, B., Whaley, J., Lam, M.S.: Reflection Analysis for Java. In: Yi, K. (ed.) APLAS 2005. LNCS, vol.\u00a03780, pp. 139\u2013160. Springer, Heidelberg (2005)"},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Loginov, A., Yahav, E., Chandra, S., Fink, S., Rinetzky, N., Nanda, M.G.: Verifying dereference safety via expanding-scope analysis. In: ISSTA 2008: International Symposium on Software Testing and Analysis (2008)","DOI":"10.1145\/1390630.1390657"},{"key":"8_CR41","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/1806596.1806631","volume-title":"Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2010","author":"M. Might","year":"2010","unstructured":"Might, M., Smaragdakis, Y., Van Horn, D.: Resolving and exploiting the k-CFA paradox: illuminating functional vs. object-oriented program analysis. In: Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2010, pp. 305\u2013315. ACM, New York (2010)"},{"issue":"1","key":"8_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1044834.1044835","volume":"14","author":"A. Milanova","year":"2005","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. ACM Trans. Softw. Eng. Methodol.\u00a014(1), 1\u201341 (2005)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Naik, M., Aiken, A., Whaley, J.: Effective static race detection for Java. In: PLDI, pp. 308\u2013319 (2006)","DOI":"10.1145\/1133981.1134018"},{"key":"8_CR44","unstructured":"O\u2019Callahan, R.: Generalized Aliasing as a Basis for Program Analysis Tools. PhD thesis, Carnegie Mellon University (November 2000)"},{"key":"8_CR45","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/117954.117965","volume-title":"Conference Proceedings on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA 1991","author":"J. Palsberg","year":"1991","unstructured":"Palsberg, J., Schwartzbach, M.I.: Object-oriented type inference. In: Conference Proceedings on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA 1991, pp. 146\u2013161. ACM, New York (1991)"},{"key":"8_CR46","unstructured":"Pearce, D.J.: Some directed graph algorithms and their application to pointer analysis. PhD thesis, Imperial College of Science, Technology and Medicine, University of London (2005)"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Pearce, D.J., Kelly, P.H.J., Hankin, C.: Online cycle detection and difference propagation for pointer analysis. In: Proceedings of the Third International IEEE Workshop on Source Code Analysis and Manipulation (2003)","DOI":"10.1109\/SCAM.2003.1238026"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Reps, T.: Solving demand versions of interprocedural analysis problems. In: International Conference on Compiler Construction (CC), Edinburgh, Scotland (April 1994)","DOI":"10.1007\/3-540-57877-3_26"},{"issue":"11-12","key":"8_CR49","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/S0950-5849(98)00093-7","volume":"40","author":"T. Reps","year":"1998","unstructured":"Reps, T.: Program analysis via graph reachability. Information and Software Technology\u00a040(11-12), 701\u2013726 (1998)","journal-title":"Information and Software Technology"},{"issue":"1","key":"8_CR50","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1145\/345099.345137","volume":"22","author":"T. Reps","year":"2000","unstructured":"Reps, T.: Undecidability of context-sensitive data-independence analysis. ACM Trans. Program. Lang. Syst.\u00a022(1), 162\u2013186 (2000)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"8_CR51","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M.: Precise interprocedural dataflow analysis via graph reachability. In: ACM Symposium on Principles of Programming Languages (POPL) (1995)","DOI":"10.1145\/199448.199462"},{"key":"8_CR52","doi-asserted-by":"crossref","unstructured":"Rountev, A., Milanova, A., Ryder, B.G.: Points-to analysis for Java using annotated constraints. In: Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), Tampa Bay, Florida (October 2001)","DOI":"10.1145\/504282.504286"},{"key":"8_CR53","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/514188.514190","volume":"24","author":"M. Sagiv","year":"2002","unstructured":"Sagiv, M., Reps, T., Wilhelm, R.: Parametric shape analysis via 3-valued logic. ACM Trans. Program. Lang. Syst.\u00a024, 217\u2013298 (2002)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"8_CR54","first-page":"71","volume-title":"Proceeding of the 33rd International Conference on Software Engineering, ICSE 2011","author":"M. Sch\u00e4fer","year":"2011","unstructured":"Sch\u00e4fer, M., Sridharan, M., Dolby, J., Tip, F.: Refactoring Java programs for flexible locking. In: Proceeding of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 71\u201380. ACM, New York (2011)"},{"key":"8_CR55","unstructured":"Sharir, M., Pnueli, A.: Two approaches to interprocedural data flow analysis, ch. 7, pp. 189\u2013233. Prentice-Hall (1981)"},{"key":"8_CR56","doi-asserted-by":"crossref","unstructured":"Shivers, O.: Control flow analysis in Scheme. In: Conference on Programming Language Design and Implementation, PLDI (1988)","DOI":"10.1145\/53990.54007"},{"key":"8_CR57","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1145\/1273463.1273487","volume-title":"Proceedings of the 2007 International Symposium on Software Testing and Analysis, ISSTA 2007","author":"S. Shoham","year":"2007","unstructured":"Shoham, S., Yahav, E., Fink, S., Pistoia, M.: Static specification mining using automata-based abstractions. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, ISSTA 2007, pp. 174\u2013184. ACM, New York (2007)"},{"key":"8_CR58","doi-asserted-by":"crossref","unstructured":"Smaragdakis, Y., Bravenboer, M., Lhot\u00e1k, O.: Pick your contexts well: understanding object-sensitivity. In: POPL, pp. 17\u201330 (2011)","DOI":"10.1145\/1925844.1926390"},{"key":"8_CR59","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/2048066.2048145","volume-title":"Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2011","author":"M. Sridharan","year":"2011","unstructured":"Sridharan, M., Artzi, S., Pistoia, M., Guarnieri, S., Tripp, O., Berg, R.: F4F: taint analysis of framework-based web applications. In: Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2011, pp. 1053\u20131068. ACM, New York (2011)"},{"key":"8_CR60","doi-asserted-by":"crossref","unstructured":"Sridharan, M., Bod\u00edk, R.: Refinement-based context-sensitive points-to analysis for Java. In: Conference on Programming Language Design and Implementation, PLDI (2006)","DOI":"10.1145\/1133981.1134027"},{"key":"8_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-642-31057-7_20","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"M. Sridharan","year":"2012","unstructured":"Sridharan, M., Dolby, J., Chandra, S., Sch\u00e4fer, M., Tip, F.: Correlation Tracking for Points-To Analysis of JavaScript. In: Noble, J. (ed.) ECOOP 2012. LNCS, vol.\u00a07313, pp. 435\u2013458. Springer, Heidelberg (2012)"},{"key":"8_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-03237-0_15","volume-title":"Static Analysis","author":"M. Sridharan","year":"2009","unstructured":"Sridharan, M., Fink, S.J.: The Complexity of Andersen\u2019s Analysis in Practice. In: Palsberg, J., Su, Z. (eds.) SAS 2009. LNCS, vol.\u00a05673, pp. 205\u2013221. Springer, Heidelberg (2009)"},{"key":"8_CR63","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/1250734.1250748","volume-title":"Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007","author":"M. Sridharan","year":"2007","unstructured":"Sridharan, M., Fink, S.J., Bodik, R.: Thin slicing. In: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007, pp. 112\u2013122. ACM, New York (2007)"},{"key":"8_CR64","doi-asserted-by":"crossref","unstructured":"Sridharan, M., Gopan, D., Shan, L., Bod\u00edk, R.: Demand-driven points-to analysis for Java. In: Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA (2005)","DOI":"10.1145\/1094811.1094817"},{"key":"8_CR65","doi-asserted-by":"crossref","unstructured":"Steensgaard, B.: Points-to analysis in almost linear time. In: ACM Symposium on Principles of Programming Languages, POPL (1996)","DOI":"10.1145\/237721.237727"},{"key":"8_CR66","doi-asserted-by":"crossref","unstructured":"Tip, F., Palsberg, J.: Scalable propagation-based call graph construction algorithms. In: Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), Minneapolis, MN (October 2000)","DOI":"10.1145\/353171.353190"},{"key":"8_CR67","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1145\/1806799.1806876","volume-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, ICSE 2010","author":"E. Torlak","year":"2010","unstructured":"Torlak, E., Chandra, S.: Effective interprocedural resource leak detection. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, ICSE 2010, pp. 535\u2013544. ACM, New York (2010)"},{"key":"8_CR68","doi-asserted-by":"crossref","unstructured":"Tripp, O., Pistoia, M., Fink, S.J., Sridharan, M., Weisman, O.: TAJ: effective taint analysis of web applications. In: PLDI (2009)","DOI":"10.1145\/1542476.1542486"},{"key":"8_CR69","unstructured":"T.J. Watson Libraries for Analysis (WALA), http:\/\/wala.sf.net ."},{"key":"8_CR70","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/11575467_8","volume-title":"Programming Languages and Systems","author":"J. Whaley","year":"2005","unstructured":"Whaley, J., Avots, D., Carbin, M., Lam, M.S.: Using Datalog with Binary Decision Diagrams for Program Analysis. In: Yi, K. (ed.) APLAS 2005. LNCS, vol.\u00a03780, pp. 97\u2013118. Springer, Heidelberg (2005)"},{"key":"8_CR71","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/3-540-45789-5_15","volume-title":"Static Analysis","author":"J. Whaley","year":"2002","unstructured":"Whaley, J., Lam, M.S.: An Efficient Inclusion-Based Points-To Analysis for Strictly-Typed Languages. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 180\u2013195. Springer, Heidelberg (2002)"},{"key":"8_CR72","doi-asserted-by":"crossref","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: Conference on Programming Language Design and Implementation (PLDI) (2004)","DOI":"10.1145\/996841.996859"},{"key":"8_CR73","doi-asserted-by":"crossref","unstructured":"Whaley, J., Rinard, M.: Compositional pointer and escape analysis for Java programs. In: Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA) (November 1999)","DOI":"10.1145\/320384.320400"},{"key":"8_CR74","doi-asserted-by":"crossref","unstructured":"Wilson, R.P., Lam, M.S.: Efficient context-sensitive pointer analysis for C programs. In: Conference on Programming Language Design and Implementation, PLDI (1995)","DOI":"10.1145\/207110.207111"},{"key":"8_CR75","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-19823-6_3","volume-title":"Engineering of Software","author":"E. Yahav","year":"2011","unstructured":"Yahav, E., Fink, S.: The SAFE experience. In: Engineering of Software, pp. 17\u201333. Springer, Heidelberg (2011)"},{"key":"8_CR76","doi-asserted-by":"crossref","unstructured":"Zhu, J., Calman, S.: Symbolic pointer analysis revisited. In: Conference on Programming Language Design and Implementation (PLDI) (2004)","DOI":"10.1145\/996841.996860"}],"container-title":["Lecture Notes in Computer Science","Aliasing in Object-Oriented Programming. Types, Analysis and Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36946-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T01:29:01Z","timestamp":1562808541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36946-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642369452","9783642369469"],"references-count":76,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36946-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}