lecture-05-Ch06-DataFlow-3

lecture-05-Ch06-DataFlow-3 - Lecture 5 - Dependence and...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture 5 - Dependence and Data Flow Models Spring 2010 CSci 5802 1 CSci 5802 Software Engineering II 1 Spring 2010 CSci 5802 Dependence and Data Flow Models Chapter 6 ht Why Data Flow Models? Models from Chapter 5 emphasized control Control flow graph, call graph, finite state machines We also need to reason about dependence Where does this value of x come from? What would be affected by changing this? tp://www.umsec.umn.edu What would be affected by changing this? ... Many program analyses and test design techniques use data flow information Often in combination with control flow Example: “Taint” analysis to prevent SQL injection attacks Example: Dataflow test criteria (Ch.13) Spring 2010 CSci 5802 Ch 6, slide 2 Aims for Today Understand basics of data-flow models and the related concepts (def-use pairs, dominators…) Understand some analyses that can be performed with the data-flow model of a program The data flow analyses to build models Analyses that use the data flow models Understand basic trade-offs in modeling data flow
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/21/2011 for the course CSCI 5802 taught by Professor Heimdahl,m during the Spring '08 term at Minnesota.

Page1 / 4

lecture-05-Ch06-DataFlow-3 - Lecture 5 - Dependence and...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online