lecture-05-Ch06-DataFlow-2

lecture-05-Ch06-DataFlow-2 - Lecture 5 - Dependence and...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture 5 - Dependence and Data Flow Models Spring 2010 CSci 5802 1 CSci 5802 Software Engineering II Dependence and Data Flow Models Chapter 6 1 Spring 2010 CSci 5802 Why Data Flow Models? Models from Chapter 5 emphasized control Control flow graph, call graph, finite state machines http://www We also need to reason about dependence Where does this value of x come from? What would be affected by changing this? ... Many program analyses and test design techniques use data flow information .umsec.umn.edu Often in combination with control flow Example: “Taint” analysis to prevent SQL injection attacks Example: Dataflow test criteria (Ch.13) Spring 2010 CSci 5802 Ch 6, slide 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture 5 - Dependence and Data Flow Models Spring 2010 CSci 5802 2 Aims for Today Understand basics of data-flow models and the related concepts (def-use pairs, dominators…) http://www Understand some analyses that can be performed with the data-flow model of a program The data flow analyses to build models Analyses that use the data flow models Understand basic trade-offs in modeling data flow .umsec.umn.edu Variations and limitations of data-flow models and
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/21/2011 for the course CSCI 5802 taught by Professor Heimdahl,m during the Spring '08 term at Minnesota.

Page1 / 6

lecture-05-Ch06-DataFlow-2 - Lecture 5 - Dependence and...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online