skip to main content
A Survey of Program Slicing Techniques.July 1994
1994 Technical Report
Publisher:
  • CWI (Centre for Mathematics and Computer Science)
  • P. O. Box 94079 NL-1090 GB Amsterdam
  • Netherlands
Published:31 July 1994
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Murali A, Mathews N, Alfadel M, Nagappan M and Xu M FuzzSlice: Pruning False Positives in Static Analysis Warnings through Function-Level Fuzzing Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, (1-13)
  2. ACM
    Campos Ferreira Guimarães B and Quintão Pereira F Lazy Evaluation for the Lazy: Automatically Transforming Call-by-Value into Call-by-Need Proceedings of the 32nd ACM SIGPLAN International Conference on Compiler Construction, (239-249)
  3. Wang Y, Jia P, Peng X, Huang C and Liu J (2023). BinVulDet, Computers and Security, 125:C, Online publication date: 1-Feb-2023.
  4. Salimi S and Kharrazi M (2022). VulSlicer, Journal of Systems and Software, 193:C, Online publication date: 1-Nov-2022.
  5. Jiang Y, Su X, Treude C and Wang T (2022). Hierarchical semantic-aware neural code representation, Journal of Systems and Software, 191:C, Online publication date: 1-Sep-2022.
  6. ACM
    Hough K and Bell J (2021). A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships, ACM Transactions on Software Engineering and Methodology, 31:2, (1-43), Online publication date: 30-Apr-2022.
  7. Alomari H and Stephan M (2022). Clone detection through srcClone, Journal of Systems and Software, 184:C, Online publication date: 1-Feb-2022.
  8. ACM
    Bruce B, Zhang T, Arora J, Xu G and Kim M JShrink: in-depth investigation into debloating modern Java applications Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (135-146)
  9. ACM
    Pârțachi P, Dash S, Allamanis M and Barr E Flexeme: untangling commits using lexical flows Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (63-74)
  10. ACM
    Netravali R and Mickens J Reverb Proceedings of the ACM Symposium on Cloud Computing, (428-440)
  11. ACM
    Babić D, Bucur S, Chen Y, Ivančić F, King T, Kusano M, Lemieux C, Szekeres L and Wang W FUDGE: fuzz driver generation at scale Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (975-985)
  12. ACM
    Karakoy M, Kislal O, Tang X, Kandemir M and Arunachalam M (2019). Architecture-Aware Approximate Computing, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 3:2, (1-24), Online publication date: 19-Jun-2019.
  13. ACM
    Milroy D, Baker A, Hammerling D, Kim Y, Jessup E and Hauser T Making Root Cause Analysis Feasible for Large Code Bases Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, (73-84)
  14. ACM
    Bhardwaj K, Saunders M, Juneja N and Gavrilovska A Serving Mobile Apps Proceedings of the Fourteenth EuroSys Conference 2019, (1-15)
  15. ACM
    Ahmadvand M, Hayrapetyan A, Banescu S and Pretschner A Practical Integrity Protection with Oblivious Hashing Proceedings of the 34th Annual Computer Security Applications Conference, (40-52)
  16. ACM
    Kiss Á, Hodován R and Gyimóthy T HDDr: a recursive variant of the hierarchical Delta debugging algorithm Proceedings of the 9th ACM SIGSOFT International Workshop on Automating TEST Case Design, Selection, and Evaluation, (16-22)
  17. Cheng Z and Tisi M (2018). Slicing ATL model transformations for scalable deductive verification and fault localization, International Journal on Software Tools for Technology Transfer (STTT), 20:6, (645-663), Online publication date: 1-Nov-2018.
  18. Rengasamy P, Zhang H, Zhao S, Nachiappan N, Sivasubramaniam A, Kandemir M and Das C CritICs critiquing criticality in mobile apps Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, (867-880)
  19. Müller T, Dietrich B and Grust T (2018). You say 'what', i hear 'where' and 'why', Proceedings of the VLDB Endowment, 11:11, (1536-1549), Online publication date: 1-Jul-2018.
  20. Dao T, Zhang L and Meng N How does execution information help with information-retrieval based bug localization? Proceedings of the 25th International Conference on Program Comprehension, (241-250)
  21. ACM
    Philips L, De Koster J, De Meuter W and De Roover C (2016). Dependence-driven delimited CPS transformation for JavaScript, ACM SIGPLAN Notices, 52:3, (59-69), Online publication date: 12-May-2017.
  22. Cheng Z and Tisi M A Deductive Approach for Fault Localization in ATL Model Transformations Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (300-317)
  23. Parvez R, Ward P and Ganesh V Combining static analysis and targeted symbolic execution for scalable bug-finding in application binaries Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, (116-127)
  24. ACM
    Philips L, De Koster J, De Meuter W and De Roover C Dependence-driven delimited CPS transformation for JavaScript Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, (59-69)
  25. ACM
    Rodriguez-Cancio M, Combemale B and Baudry B Automatic microbenchmark generation to prevent dead code elimination and constant folding Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (132-143)
  26. ACM
    Phothilimthana P, Schuldt M and Bodik R (2016). Compiling a gesture recognition application for a low-power spatial architecture, ACM SIGPLAN Notices, 51:5, (102-112), Online publication date: 1-Aug-2016.
  27. ACM
    Emani K, Ramachandra K, Bhattacharya S and Sudarshan S Extracting Equivalent SQL from Imperative Code in Database Applications Proceedings of the 2016 International Conference on Management of Data, (1781-1796)
  28. ACM
    Phothilimthana P, Schuldt M and Bodik R Compiling a gesture recognition application for a low-power spatial architecture Proceedings of the 17th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, Tools, and Theory for Embedded Systems, (102-112)
  29. Panigrahi C and Mall R (2016). Regression test size reduction using improved precision slices, Innovations in Systems and Software Engineering, 12:2, (153-159), Online publication date: 1-Jun-2016.
  30. ACM
    Atta I, Tong X, Srinivasan V, Baldini I and Moshovos A Self-contained, accurate precomputation prefetching Proceedings of the 48th International Symposium on Microarchitecture, (153-165)
  31. ACM
    Nguyen H, Kästner C and Nguyen T Cross-language program slicing for dynamic web applications Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (369-380)
  32. Horváth F and Gergely T (2015). Structural information aided automated test method for magic 4GL, Acta Cybernetica, 22:1, (81-99), Online publication date: 1-Jan-2015.
  33. ACM
    Nazaré H, Maffra I, Santos W, Barbosa L, Gonnord L and Quintão Pereira F (2014). Validation of memory accesses through symbolic analyses, ACM SIGPLAN Notices, 49:10, (791-809), Online publication date: 31-Dec-2015.
  34. ACM
    Nazaré H, Maffra I, Santos W, Barbosa L, Gonnord L and Quintão Pereira F Validation of memory accesses through symbolic analyses Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, (791-809)
  35. Vogl S, Gawlik R, Garmany B, Kittel T, Pfoh J, Eckert C and Holz T Dynamic hooks Proceedings of the 23rd USENIX conference on Security Symposium, (813-828)
  36. ACM
    LaPre J, Gonsiorowski E and Carothers C LORAIN Proceedings of the 2nd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (3-14)
  37. ACM
    Tragatschnig S, Tran H and Zdun U Impact analysis for event-based systems using change patterns Proceedings of the 29th Annual ACM Symposium on Applied Computing, (763-768)
  38. ACM
    Abadi A, Feldman Y and Shagin K A screen-oriented representation for mobile applications Proceedings of the 2013 companion publication for conference on Systems, programming, & applications: software for humanity, (79-80)
  39. Ayrault P, Benayoun V, Dubois C and Pessaux F ML dependency analysis for assessors Proceedings of the 10th international conference on Software Engineering and Formal Methods, (278-292)
  40. Rocha H, Barreto R, Cordeiro L and Neto A Understanding programming bugs in ANSI-C software using bounded model checking counter-examples Proceedings of the 9th international conference on Integrated Formal Methods, (128-142)
  41. Alkhalaf M, Bultan T and Gallegos J Verifying client-side input validation functions using string analysis Proceedings of the 34th International Conference on Software Engineering, (947-957)
  42. Kwon T and Su Z Static detection of unsafe component loadings Proceedings of the 21st international conference on Compiler Construction, (122-143)
  43. ACM
    Raman A, Yorsh G, Vechev M and Yahav E Sprint Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (259-274)
  44. ACM
    Raman A, Yorsh G, Vechev M and Yahav E (2011). Sprint, ACM SIGPLAN Notices, 46:10, (259-274), Online publication date: 18-Oct-2011.
  45. ACM
    Kim J, Kim H, Lee J and Lee J (2011). Achieving a single compute device image in OpenCL for multiple GPUs, ACM SIGPLAN Notices, 46:8, (277-288), Online publication date: 7-Sep-2011.
  46. ACM
    Binkley D, Harman M and Lakhotia K (2011). FlagRemover, ACM Transactions on Software Engineering and Methodology, 20:3, (1-33), Online publication date: 1-Aug-2011.
  47. ACM
    Babić D, Martignoni L, McCamant S and Song D Statically-directed dynamic automated test generation Proceedings of the 2011 International Symposium on Software Testing and Analysis, (12-22)
  48. ACM
    Zhang C, Guo Z, Wu M, Lu L, Fan Y, Zhao J and Zhang Z AutoLog Proceedings of the Second Asia-Pacific Workshop on Systems, (1-5)
  49. Jongmans S, Hindriks K and van Riemsdijk M State space reduction for model checking agent programs Proceedings of the 9th international conference on Programming Multi-Agent Systems, (133-151)
  50. ACM
    Navabpour S, Bonakdarpour B and Fischmeister S (2011). Software debugging and testing using the abstract diagnosis theory, ACM SIGPLAN Notices, 46:5, (111-120), Online publication date: 11-Apr-2011.
  51. ACM
    Navabpour S, Bonakdarpour B and Fischmeister S Software debugging and testing using the abstract diagnosis theory Proceedings of the 2011 SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems, (111-120)
  52. Lazzarini Lemos O, Bajracharya S, Ossher J, Masiero P and Lopes C (2011). A test-driven approach to code search and its application to the reuse of auxiliary functionality, Information and Software Technology, 53:4, (294-306), Online publication date: 1-Apr-2011.
  53. ACM
    Kim J, Kim H, Lee J and Lee J Achieving a single compute device image in OpenCL for multiple GPUs Proceedings of the 16th ACM symposium on Principles and practice of parallel programming, (277-288)
  54. ACM
    Zhang C, Yan D, Zhao J, Chen Y and Yang S BPGen Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, (271-274)
  55. Rule-Based Approaches for Equivalence Checking of SpecC Programs Proceedings of the Sixth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (39-48)
  56. ACM
    Maule A, Emmerich W and Rosenblum D Impact analysis of database schema changes Proceedings of the 30th international conference on Software engineering, (451-460)
  57. Voron J and Kordon F Transforming sources to petri nets Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (1-10)
  58. Ammann P, Offutt J and Xu W Coverage criteria for state based specifications Formal methods and testing, (118-156)
  59. ACM
    Majumdar A, Drape S and Thomborson C Slicing obfuscations Proceedings of the 2007 ACM workshop on Digital Rights Management, (70-81)
  60. Danicic S, Harman M, Hierons R, Howroyd J and Laurence M (2007). Equivalence of linear, free, liberal, structured program schemas is decidable in polynomial time, Theoretical Computer Science, 373:1-2, (1-18), Online publication date: 10-Mar-2007.
  61. ACM
    Fernandes J and Saraiva J Tools and libraries to model and manipulate circular programs Proceedings of the 2007 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation, (102-111)
  62. Ren X, Chesley O and Ryder B (2006). Identifying Failure Causes in Java Programs, IEEE Transactions on Software Engineering, 32:9, (718-732), Online publication date: 1-Sep-2006.
  63. Chen F and Roşu G Parametric and termination-sensitive control dependence Proceedings of the 13th international conference on Static Analysis, (387-404)
  64. ACM
    Guo P, Perkins J, McCamant S and Ernst M Dynamic inference of abstract types Proceedings of the 2006 international symposium on Software testing and analysis, (255-265)
  65. ACM
    Rothamel T, Liu Y, Heitmeyer C and Leonard E (2006). Generating optimized code from SCR specifications, ACM SIGPLAN Notices, 41:7, (135-144), Online publication date: 12-Jul-2006.
  66. ACM
    Rothamel T, Liu Y, Heitmeyer C and Leonard E Generating optimized code from SCR specifications Proceedings of the 2006 ACM SIGPLAN/SIGBED conference on Language, compilers, and tool support for embedded systems, (135-144)
  67. Chinchani R and van den Berg E A fast static analysis approach to detect exploit code inside network flows Proceedings of the 8th international conference on Recent Advances in Intrusion Detection, (284-308)
  68. Al Dallal J An efficient algorithm for computing all program static slices Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems, (1-5)
  69. ACM
    Neubauer M and Thiemann P (2005). From sequential programs to multi-tier applications by program transformation, ACM SIGPLAN Notices, 40:1, (221-232), Online publication date: 12-Jan-2005.
  70. ACM
    Neubauer M and Thiemann P From sequential programs to multi-tier applications by program transformation Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (221-232)
  71. Binkley D and Harman M (2004). Analysis and Visualization of Predicate Dependence on Formal Parameters and Global Variables, IEEE Transactions on Software Engineering, 30:11, (715-735), Online publication date: 1-Nov-2004.
  72. ACM
    Baresel A, Binkley D, Harman M and Korel B Evolutionary testing in the presence of loop-assigned flags Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (108-118)
  73. ACM
    Baresel A, Binkley D, Harman M and Korel B (2004). Evolutionary testing in the presence of loop-assigned flags, ACM SIGSOFT Software Engineering Notes, 29:4, (108-118), Online publication date: 1-Jul-2004.
  74. Eshuis R and Wieringa R (2004). Tool Support for Verifying UML Activity Diagrams, IEEE Transactions on Software Engineering, 30:7, (437-447), Online publication date: 1-Jul-2004.
  75. Spinellis D (2003). Global Analysis and Transformations in Preprocessed Languages, IEEE Transactions on Software Engineering, 29:11, (1019-1030), Online publication date: 1-Nov-2003.
  76. Binkley D and Harman M An empirical study of predicate dependence levels and trends Proceedings of the 25th International Conference on Software Engineering, (330-339)
  77. Schweitz E and Agrawal D (2002). A Parallelization Domain Oriented Multilevel Graph Partitioner, IEEE Transactions on Computers, 51:12, (1435-1441), Online publication date: 1-Dec-2002.
  78. ACM
    Li B (2002). Analyzing information-flow in java program based on slicing technique, ACM SIGSOFT Software Engineering Notes, 27:5, (98-103), Online publication date: 1-Sep-2002.
  79. ACM
    Chung I, Lee W, Yoon G and Kwon Y Program slicing based on specification Proceedings of the 2001 ACM symposium on Applied computing, (605-609)
  80. Lain A, Chakrabarti D and Banerjee P (2000). Compiler and Run-Time Support for Exploiting Regularity within Irregular Applications, IEEE Transactions on Parallel and Distributed Systems, 11:2, (119-135), Online publication date: 1-Feb-2000.
  81. ACM
    Liao S, Diwan A, Bosch R, Ghuloum A and Lam M (1999). SUIF Explorer, ACM SIGPLAN Notices, 34:8, (37-48), Online publication date: 1-Aug-1999.
  82. ACM
    Liao S, Diwan A, Bosch R, Ghuloum A and Lam M SUIF Explorer Proceedings of the seventh ACM SIGPLAN symposium on Principles and practice of parallel programming, (37-48)
  83. Le Métayer D, Nicolas V and Ridoux O (1998). Exploring the Software Development Trilogy, IEEE Software, 15:6, (75-81), Online publication date: 1-Nov-1998.
  84. ACM
    Sloane A and Holdsworth J Beyond traditional program slicing Proceedings of the 1996 ACM SIGSOFT international symposium on Software testing and analysis, (180-186)
  85. ACM
    DeMillo R, Pan H and Spafford E Critical slicing for software fault localization Proceedings of the 1996 ACM SIGSOFT international symposium on Software testing and analysis, (121-134)
  86. ACM
    Sloane A and Holdsworth J (1996). Beyond traditional program slicing, ACM SIGSOFT Software Engineering Notes, 21:3, (180-186), Online publication date: 1-May-1996.
  87. ACM
    DeMillo R, Pan H and Spafford E (1996). Critical slicing for software fault localization, ACM SIGSOFT Software Engineering Notes, 21:3, (121-134), Online publication date: 1-May-1996.
  88. ACM
    Lain A and Banerjee P Compiler support for hybrid irregular accesses on multicomputers Proceedings of the 10th international conference on Supercomputing, (1-9)
  89. ACM
    Field J, Ramalingam G and Tip F Parametric program slicing Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (379-392)
Contributors
  • Northeastern University

Recommendations