UCLA CS 232 Static Program Analysis Fall 2008

Homework 1: Constraint-based analysis

Write set constraints for constraint-based analysis of the Java expressions new (), method call with one argument, and Java assignment. For a method call, allow the set for the actual parameter to be a subset of the set for the formal parameter. Give a second version of the constraints in which we insist that for a method call, the set for the actual parameter must be equal to the set for the formal parameter. The second version is more conservative, that is, less precise. Show an example program that illustrates why the second version is more conservative. Present the constraints for both the first and the second version of the analysis, as well as the least solution for each one.

Homework 2: Pointer analysis

In the paper by Nevin Heintze and Olivier Tardieu entitled Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second, Figure 2 presents deduction rules for pointer analysis. Rephrase the analysis in Figure 2 to use set constraints. Show the set constraints and their least solution for the example in Figure 3.

Homework 3: SSA form

Let S be a family of nonempty sets. The intersection graph of S is obtained by representing each set in S by a vertex and connecting two vertices by an edge if and only if their corresponding sets intersect. The intersection graph of the live ranges of a program is called an interference graph. A graph is chordal if and only if it can be represented as an intersection graph of subtrees of a tree. Prove that a program in strict SSA form has a chordal interference graph.

Homework 4: Context-sensitive analysis

Homework 5: Type-safe method inlining

Read the paper by Neal Glew and Jens Palsberg called Type-safe method inlining. On p.16, item (36) is a form of constraint generated from occurrences of "this". Suppose we don't generate this constraint. Now do one of two things. Either prove that the resulting analysis satisfies Typability Preservation (Theorem 4 in the paper); submit your proof. Or else write a program in the example language of the paper such that (1) the program type checks and (2) after analysis and transformation, the transformed program does not type check. Submit

Homework 6: Fast control-flow analysis

Consider the lambda-term:
G = [lambda1 f.(f(f(lambda2 x.x)))](lambda3 y.y)
Show the graph for G that is used by the Heintze/McAllester quadratic-time flow analysis algorithm. What is the label set for G produced by the algorithm?

Homework 7: Relationships between static analysis and type systems

Consider the language generated by the grammar:
e ::= x | lambda x.e | e e | 0 | e+1
We can define a type system with the simple types
t ::= int | t -> t
see for example "A simple algorithm and proof for type inference" by Mitchell Wand. Specify a flow analysis which is equivalent to the type system with simple types. Here "equivalent" is in the sense of "A type system equivalent to flow analysis" by Jens Palsberg and Patrick O'Keefe. Justify informally in detail why your flow analysis is equivalent to the type system.

Homework 8: Stack bounds for event-driven software

In the interrupt calculus of Stack Size Analysis of Interrupt Driven Software, write the simplest program you can think of which has 3 interrupt handlers and for which the maximum stack size is 6. Argue informally why your program has a maximum stack size of 6.