{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:31:12Z","timestamp":1770280272193,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662534120","type":"print"},{"value":"9783662534137","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53413-7_5","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T11:57:11Z","timestamp":1472558231000},"page":"84-104","source":"Crossref","is-referenced-by-count":47,"title":["Structure-Sensitive Points-To Analysis for C and C++"],"prefix":"10.1007","author":[{"given":"George","family":"Balatsouras","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yannis","family":"Smaragdakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"5_CR1","unstructured":"Andersen, L.O.: Program analysis and specialization for the C programming language. Ph.d. thesis, DIKU, University of Copenhagen, May 1994"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Avots, D., Dalton, M., Livshits, B., Lam, M.S.: Improving software security with a C pointer analysis. In: Proceedings of the 27th International Conference on Software Engineering, ICSE 2005, pp. 332\u2013341. ACM, New York (2005)","DOI":"10.1109\/ICSE.2005.1553576"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Berndl, M., Lhot\u00e1k, O., Qian, F., Hendren, L.J., Umanee, N.: Points-to analysis using BDDs. In: Proceedings of the 2003 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2003, pp. 103\u2013114. ACM, New York (2003)","DOI":"10.1145\/781131.781144"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bravenboer, M., Smaragdakis, Y.: Strictly declarative specification of sophisticated points-to analyses. In: Proceedings of the 24th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009. ACM, New York (2009)","DOI":"10.1145\/1640089.1640108"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Das, M.: Unification-based pointer analysis with directional assignments. In: Proceedings of the 2000 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2000, pp. 35\u201346. ACM, New York (2000)","DOI":"10.1145\/349299.349309"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: Proceedings of the 1994 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 1994, pp. 242\u2013256. ACM, New York (1994)","DOI":"10.1145\/178243.178264"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code. In: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007, pp. 290\u2013299. ACM, New York (2007)","DOI":"10.1145\/1250734.1250767"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-540-74061-2_17","volume-title":"Static Analysis","author":"B Hardekopf","year":"2007","unstructured":"Hardekopf, B., Lin, C.: Exploiting pointer and location equivalence to optimize pointer analysis. In: Riis Nielson, H., Fil\u00e9, G. (eds.) SAS 2007. LNCS, vol. 4634, pp. 265\u2013280. Springer, Heidelberg (2007)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: Semi-sparse flow-sensitive pointer analysis. In: Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2009, pp. 226\u2013238. ACM, New York (2009)","DOI":"10.1145\/1594834.1480911"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: Flow-sensitive pointer analysis for millions of lines of code. In: Proceedings of the 9th International Symposium on Code Generation and Optimization, CGO 2011, pp. 289\u2013298. IEEE Computer Society (2011)","DOI":"10.1109\/CGO.2011.5764696"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Heintze, N., Tardieu, O.: Ultra-fast aliasing analysis using CLA: a million lines of C code in a second. In: Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2001, pp. 254\u2013263. ACM, New York (2001)","DOI":"10.1145\/378795.378855"},{"issue":"4","key":"5_CR12","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1145\/325478.325519","volume":"21","author":"M Hind","year":"1999","unstructured":"Hind, M., Burke, M.G., Carini, P.R., Choi, J.: Interprocedural pointer alias analysis. ACM Trans. Program. Lang. Syst. 21(4), 848\u2013894 (1999)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Lattner, C., Lenharth, A., Adve, V.S.: Making context-sensitive points-to analysis with heap cloning practical for the real world. In: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007, pp. 278\u2013289. ACM, New York (2007)","DOI":"10.1145\/1250734.1250766"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Lhot\u00e1k, O., Chung, K.C.A.: Points-to analysis with efficient strong updates. In: Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011, pp. 3\u201316. ACM, New York (2011)","DOI":"10.1145\/1926385.1926389"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","first-page":"27","volume-title":"ECOOP 2014 \u2013 Object-Oriented Programming","author":"Y Li","year":"2014","unstructured":"Li, Y., Tan, T., Sui, Y., Xue, J.: Self-inferencing reflection resolution for Java. In: Jones, R. (ed.) ECOOP 2014. LNCS, vol. 8586, pp. 27\u201353. Springer, Heidelberg (2014)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/11575467_11","volume-title":"Programming Languages and Systems","author":"B Livshits","year":"2005","unstructured":"Livshits, B., Whaley, J., Lam, M.S.: Reflection analysis for Java. In: Yi, K. (ed.) APLAS 2005. LNCS, vol. 3780, pp. 139\u2013160. Springer, Heidelberg (2005)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to and side-effect analyses for Java. In: Proceedings of the 2002 International Symposium on Software Testing and Analysis, ISSTA 2002, pp. 1\u201311. ACM, New York (2002)","DOI":"10.1145\/566172.566174"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Min\u00e9, A.: Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics. In: Proceedings of the 2006 ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, LCTES 2006, pp. 54\u201363. ACM (2006)","DOI":"10.1145\/1159974.1134659"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Nystrom, E.M., Kim, H., Hwu, W.W.: Importance of heap specialization in pointer analysis. In: Proceedings of the 5th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE 2004, pp. 43\u201348. ACM, New York (2004)","DOI":"10.1145\/996821.996836"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Pearce, D.J., Kelly, P.H.J., Hankin, C.: Efficient field-sensitive pointer analysis for C. In: Proceedings of the 5th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE 2004, pp. 37\u201342. ACM, New York (2004)","DOI":"10.1145\/996821.996835"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Pearce, D.J., Kelly, P.H.J., Hankin, C.: Efficient field-sensitive pointer analysis of C. ACM Trans. Program. Lang. Syst. 30(1) (2007)","DOI":"10.1145\/1290520.1290524"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Rountev, A., Milanova, A., Ryder, B.G.: Points-to analysis for Java using annotated constraints. In: Proceedings of the 16th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 2001, pp. 43\u201355. ACM, New York (2001)","DOI":"10.1145\/504282.504286"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-319-26529-2_26","volume-title":"Programming Languages and Systems","author":"Y Smaragdakis","year":"2015","unstructured":"Smaragdakis, Y., Balatsouras, G., Kastrinis, G., Bravenboer, M.: More sound static handling of Java reflection. In: Feng, X., et al. (eds.) APLAS 2015. LNCS, vol. 9458, pp. 485\u2013503. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26529-2_26"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Whaley, J., Rinard, M.C.: Compositional pointer and escape analysis for Java programs. In: Proceedings of the 14th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 1999, pp. 187\u2013206. ACM, New York (1999)","DOI":"10.1145\/320384.320400"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Zheng, X., Rugina, R.: Demand-driven alias analysis for C. In: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, pp. 197\u2013208. ACM, New York (2008)","DOI":"10.1145\/1328438.1328464"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53413-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:38:33Z","timestamp":1498340313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53413-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662534120","9783662534137"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53413-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}