lecture-05-Ch06-DataFlow-3

lecture-05-Ch06-DataFlow-3 - Lecture 5 Dependence and Data...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture 5 - Dependence and Data Flow Models Spring 2010 CSci 5802 1 CSci 5802 Software Engineering II 1 Spring 2010 CSci 5802 Dependence and Data Flow Models Chapter 6 ht Why Data Flow Models? Models from Chapter 5 emphasized control Control flow graph, call graph, finite state machines We also need to reason about dependence Where does this value of x come from? What would be affected by changing this? tp://www.umsec.umn.edu What would be affected by changing this? ... Many program analyses and test design techniques use data flow information Often in combination with control flow Example: “Taint” analysis to prevent SQL injection attacks Example: Dataflow test criteria (Ch.13) Spring 2010 CSci 5802 Ch 6, slide 2 Aims for Today Understand basics of data-flow models and the related concepts (def-use pairs, dominators…) Understand some analyses that can be performed with the data-flow model of a program The data flow analyses to build models Analyses that use the data flow models Understand basic trade-offs in modeling data flow
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 4

lecture-05-Ch06-DataFlow-3 - Lecture 5 Dependence and Data...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online