We introduce a new approach, CONCH, for de-bloating contexts for all the object-sensitive pointer analysis algorithms developed for object-oriented languages, where the calling contexts of a method are distinguished by its receiver objects. Our key insight is to approximate a recently proposed set of two necessary conditions for an object to be context-sensitive, i.e., context-dependent (whose precise verification is undecidable) with a set of three linearly verifiable conditions (in terms of the number of statements in the program) that are almost always necessary for real-world object-oriented applications, based on three key observations regarding context-dependability for their objects used. To create a practical implementation, we introduce a new IFDS-based algorithm for reasoning about object reachability in a program. By debloating contexts for two representative object-sensitive pointer analyses applied to a set of 12 representative Java programs, CONCH can speed up the two baselines together substantially (3.1x on average with a maximum of 15.9x) and analyze 7 more programs scalably, but at only a negligible loss of precision (less than 0.1%).
Tue 16 NovDisplayed time zone: Hobart
23:00 - 00:00 | Artefacts Plenary (Any Day Band 2)Artifact Evaluation at Kangaroo Chair(s): Aldeida Aleti Monash University, Tim Menzies North Carolina State University | ||
23:00 5mDay opening | Opening Artifact Evaluation | ||
23:05 7mKeynote | Keynote Artifact Evaluation Dirk Beyer LMU Munich, Germany | ||
23:12 3mTalk | CiFi: Versatile Analysis of Class and Field Immutability![]() ![]() Artifact Evaluation Tobias Roth Technische Universität Darmstadt, Dominik Helm Technische Universität Darmstadt, Michael Reif Technische Universität Darmstadt, Mira Mezini Technische Universität Darmstadt | ||
23:15 3mTalk | Testing Your Question Answering Software via Asking Recursively![]() ![]() Artifact Evaluation Songqiang Chen School of Computer Science, Wuhan University, Shuo Jin School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China | ||
23:18 3mTalk | Restoring the Executability of Jupyter Notebooks by Automatic Upgrade of Deprecated APIs![]() ![]() Artifact Evaluation Chenguang Zhu University of Texas at Austin, Ripon Saha Fujitsu Laboratories of America, Inc., Mukul Prasad Fujitsu Research of America, Sarfraz Khurshid The University of Texas at Austin | ||
23:21 3mTalk | Context Debloating for Object-Sensitive Pointer Analysis![]() ![]() Artifact Evaluation | ||
23:24 3mTalk | Understanding and Detecting Performance Bugs in Markdown Compilers![]() ![]() Artifact Evaluation Penghui Li The Chinese University of Hong Kong, Yinxi Liu The Chinese University of Hong Kong, Wei Meng Chinese University of Hong Kong | ||
23:27 5mProduct release | Reuse graphs Artifact Evaluation | ||
23:32 10mTalk | Most reused artefacts Artifact Evaluation | ||
23:42 18mLive Q&A | Discussion Artifact Evaluation |