The 13th International Static Analysis Symposium (SAS 2006)
Venue: Seoul National University
Contact: sas06 at ropas.snu.ac.kr
Contact: sas06 at ropas.snu.ac.kr
Program
Day 0: August 28, 2006
19:00 - 21:00 Reception
Day 1: August 29, 2006
09:00 - 10:00 Invited Talk
Unleashing the Power of Static Analysis
|
10:30 - 12:00 Session 1
Static Analysis in Disjunctive Numerical Domains
|
||
Static Analysis of Numerical Algorithms
|
||
Static Analysis of String Manipulations in Critical Embedded C Programs
|
14:00 - 15:30 Session 2
Abstract Regular Tree Model Checking of Complex Dynamic Data Structures
|
||
Structural Invariants
|
||
Existential Label Flow Inference via CFL Reachability
|
16:00 - 18:00 Session 3
Abstract Interpretation with Specialized Definitions
|
||
Underapproximating Predicate Transformers
|
||
Combining Widening and Acceleration in Linear Relation Analysis
|
||
Beyond Iteration Vectors: Instancewise Relational Abstract Domains
|
Day 2: August 30, 2006
09:00 - 10:00 Invited Talk
Separation Logic and Program Analysis
|
10:15 - 10:30 Memorial (Dr. Alain Deutsch)
10:30 - 12:30 Session 4
Specialized 3-Valued Logic Shape Analysis using Structure-Based Refinement and Loose Embedding
|
||
Recency-Abstraction for Heap-Allocated Storage
|
||
Interprocedural Shape Analysis with Separated Heap Abstractions
|
||
Automated Verification of the Deutsch-Schorr-Waite Tree-Traversal Algorithm
|
14:00 - 19:00 Excursion: Changdeokgung Palace (UNESCO World Heritage)
19:00 - 21:00 Banquet: Samcheonggak
Day 3: August 31, 2006
09:00 - 10:00 Invited Talk
Shape Analysis for Low-level Code
|
10:30 - 12:00 Session 5
Catching and Identifying Bugs in Register Allocation
|
||
Certificate Translation for Optimizing Compilers
|
||
Analysis of Low-Level Code Using Cooperating Decompilers
|
14:00 - 15:30 Session 6
Static Analysis for Java Servlets and JSP
|
||
Cryptographically-Masked Flows
|
||
Proving the Properties of Communicating Imperfectly-Clocked Synchronous Systems
|
16:00 - 17:30 Session 7
Parametric and Termination-Sensitive Control Dependence
|
||
Memory Leak Analysis by Contradiction
|
||
Path-Sensitive Dataflow Analysis with Iterative Refinement
|