Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity ESEC/FSE'18.November 4-9,2018,Lake Buena Vista.FL,USA REFERENcES [16]Ondrej Lhotak and Laurie J.Hendren.2003.Scaling Java points-to analysis using [1]Steven Arzt,Siegfried Rasthofer,Christian Fritz,Eric Bodden,Alexandre Bartel, SPARK.In Compiler Construction,12th International Conference,CC 2003.Held as Part of the joint European Conferences on Theory and Practice of Software,ETAPS 2003,Warsaw,Poland,April 7-11,2003,Proceedings (Lecture Notes in Computer analysis for android apps.In ACM SIGPLAN Conference on Programming Language Science).Gorel Hedin (Ed),Vol.2622.Springer,153-169.https://doiorg/10.1007/ Design and Implementation,PLDI4 Edinburgh,United Kingdom-june9-11, 3-540-36579-612 2014,Michael F.P.O'Boyle and Keshav Pingali (Eds.).ACM,259-269.https: [17]Ondrej Lhotak and Laurie J.Hendren.2006.Context-sensitive points-to analysis: /∥doi.arg/10.1145/25942912594299 Is it worth it?.In Compiler Construction,15th International Conference,CC2006. [2]Marc Berndl,Ondrej Lhotak,Feng Qian,Laurie J.Hendren,and Navindra Umanee Held as Part of the Joint European Conferences on Theory and Practice of Software, 2003.Points-to analysis using BDDs.In Proceedings of the ACM SIGPLAN 2003 ETAPS 2006,Vienna,Austria,March 30-31,2006,Proc edings (Lectu re Notes in Conference on Programming Language Design and Implementation 2003,San Diego. Computer Science),Alan Mycroft and Andreas Zeller (Eds.),Vol.3923.Springer, California,USA,June 9-11,2003.Ron Cytron and Rajiv Gupta (Eds.).ACM,103- 47-64.https:/doi.org10.1007/11688839_5 114.https:/doi.org/10.1145/781131.78i144 [18]Lian Li,Cristina Cifuentes,and Nathan Keynes.2011.Boosting the performance [3]Stephen M.Blackburn,Robin Garner,Chris Hoffmann,Asjad M.Khan,Kathryn S. of flow-sensitive points-to analysis using value flow.In Proceedings of the 19th MeKinley.Rotem Bentzur,Amer Diwan,Daniel Feinberg.Daniel Framp ce on Foundation Samuel 2 Guyer,Martin Hirzel,Antony L Hosking.Maria Jump,Han Bok of Software Engineering (ESEC/FSE '11).ACM,New York,NY,USA,343-353. Lee,J.Eliot B.Moss,Aashish Phansalkar,Darko Stefanovic,Thomas Van- https:/doi.org/10.1145/2025113.2025160 Drunen,Daniel von Dincklage,and Ben Wiedermann.2006. The DaCapo [19]Yue Li,Tian Tan,Yulei Sui,and Jingling Xue.2014.Self-inferencing reflection benchmarks:Java benchmarking development and analysis.In Proceedings of resolution for Java.In ECOOP 2014-Object-Oriented Programming-28th European the 21th Annual ACM SIGPLAN Confere ence on Obiect-Oriented Programming Conference,Uppsala,Sweden,July 28-August 1,2014.Proceedings(Lecture Notes Systems,Languages,and Applications,OOPSLA 2006,October 22-26,2006.Port- in Computer Science).Richard E.Jones (Ed.).Vol.8586.Springer,27-53.https: land ore gon,USA,Peri L.Tarr and William R.Cook (Eds.).ACM.169-190 /10.1007/978-3-662-44202-9_2 https/doi.org/10.1145/1167473.1167488 [20]Yue Li.Tan,and Jingling Xue2015.Effective soundness-guided reflection [4]Martin Bravenboer and Yannis Smaragdakis.2009.Strictly declarative speci- analysis.In Static Analysis-22nd International Symposium,SAS2015,Saint-Malo, fication of sophisticated points-to analyses.In Proceedings of the 24th Annual France,September 9-11,2015,Proceedings (Lecture Notes in Computer Science) ACM SIGPLAN Conference on Object-Oriented Programming,Systems,Languages Sandrine Blazy and Thomas Jensen (Eds.),Vol.9291.Springer,162-180.https: and Applications,OOPSLA 2009,October 25-29,2009,Orlando,Florida,USA,Shail /doi.0rg10.1007/978-3-662-48288-9_10 Arora and Gary T.Leavens(Eds.).ACM,243-262.https://doi.org/10.1145/1640089 [21]Yue Li,Tian Tan,Yifei Zhang.and Jingling Xue.2016.Program tailoring:Slicing by 1640108 sequential criteria.In 30th European Conference on Object-Oriented Programming [5]Satish Chandra,Stephen J.Fink,and Manu Sridharan.2009.Snugglebug:a ECOOP 2016,July 18-22,2016,Rome,Italy (LIPIcs),Shriram Krishnamurthi and powerful approach to weakest preconditions.In Proceedings of the 2009 ACM Benjamin S.Lerner (Eds.),Vol.56.Schloss Dagstuhl-Leibniz-Zentrum fuer SIGPLAN Conference on Programming Language Design and Implementation,PLDI Informatik,15:1-15:27.https://doi.org/10.4230/LIPIcs.ECOOP.2016.15 2009,Dublin,Ireland,June 15-21,2009,Michael Hind and Amer Diwan (Eds.). [22]Donglin Liang and Mary Jean Harrold.1999.Efficient points-to analysis for whole- AC3M,363-374.https:/1doi.org/10.1145/1542476.1542517 program analysis.In Softv are Engineering-ESEC/FSE'99,7th European Software [6]David R.Chase.Mark N.Wegman,and F.Kenneth Zadeck 1990.Analysis of Engineering Conference,Held jointly with the 7th ACM SIGSOFT Symposium on the pointers and structures.In Proceedings of the ACM SIGPLAN'90 Conference on Foundations of Software Engineering.Toulouse,France,September 1999,Proceedings Programming Language Design and I plementation (PLDI),White Plains,New (Lecture Notes in Computer Science).Oscar Nierstrasz and Michel Lemoine (Eds.). York,USA,June 20-22,1990,Bernard N.Fischer (Ed.).ACM,296-310.https: Vol.1687.Springer.199-215.https/doi.org/10.1007/3-540-48166-413 1/d0i0ru/101145/93542.02585 [23]Benjamin Livshits and Monica S.Lam.2005.Finding security vulnerabilities in [7]Julian Dolby et al.2018.WALA:T.J.Watson Libraries for Analysis.http://wala Java applications with static analysis.In Proceedings of the 14th USENIX Security stnet Symposium,Baltimore,MD.USA,July 31-August 5,2005,Patrick D.McDaniel [8]Stephen J.Fink,Eran Yahav,Nurit Dor,G.Ramalingam,and Emmanuel Geay. (Ed.).USENIX Association. 2008.Effective typestate verification in the presence of aliasing.ACM Trans.Softw. [24]Ana Milanova,Atanas Rountev,and Barbara G.Ryder.2002.Parameterized object Eng.Methodol.17,2(2008),9:1-9:34.https:/doi.org/10.1145/1348250.1348255 sensitivity for points-to and side-effect analyses for Java.In Proceedings of the [9]Michael I.Gordon,Deokhwan Kim,Jeff H.Perkins,Limei Gilham,Nguyen International svmoosium on software lesting and Analvsis.isstA 2002 Roma Nguyen,and Martin C.Rinard.2015. Information fow analysis of An- Italy July 22-24 2002 Phyllis G.Frankl (Ed.).ACM,1-11.https://doi.org/10. droid applications in DroidSafe.In 22nd Annual Network and Distributed Sys- 1145/566172.566174 tem Security Symposium,NDSS 2015,San Diego,California,USA,February 8- [25]Ana Milanova,Atanas Rountev,and Barbara G.Ryder.2005.Parameterized object 11,2015.The Internet Society.https://www.ndss- mposium.org/ndss2015/ sensitivity for points-to analysis for Java.ACM Trans.Softw.Eng.Methodol.14,1 information-flow-analysis-android-applications-droidsafe (2005).1-41.https-/doi.org/10.1145/1044834.1044835 [10]Neville Grech and Yannis Smaragdakis.2017.P/Taint:unified points-to and taint [26]Mayur Naik.Alex Aiken,and John Whaley.2006.Effective static race detection analysis. PACMPL1,O0PSLA(2017),102:1-102:28.htps/doi.org/10.1145 for Java.In Proceedings of the ACM SIGPLAN 2006 Conference on Programming 3133926 guage Design and Implementation,Ottaw va Ontario Canada fune 11-14 2006 [11]Behnaz Hassanshahi,Raghavendra Kagalavadi Ramesh,Padmanabhan Krish Michael I.Schwartzbach and Thomas Ball (Eds.).ACM,308-319.https://doi.org 10.1145/1133981.1134018 nan,Bernhard Scholz,and Yi Lu.2017.An efficient tunable selective points- to analysis for large codebases.In Proceedings of the 6th ACM SIGPLAN Inter- [27]Michael Pradel,Ciera Jaspan,Jonathan Aldrich,and Thomas R.Gross.2012.Stati national Workshop on State Of the Art in Program Analysis,SOAP@PLDI 2017. cally checking API protocol conformance with mined multi-object specifications Barcelona,Spain.June 18.2017.Karim Ali and Cristina Cifuentes (Eds.).ACM. In 34th International Conference on Softv e Engineering,ICSE 2012,June 2-9,2012 3-18.https://doi.org/10.1145/3088515,3088519 Zurich,Switzerland Martin Glinz,Gail C.Murphy,and Mauro Pezze (Eds.).IEEE [12]Michael Hind 2001.Pointer analysis:haven't we solved this problem yet?.In Computer Societv.925-935.https://doiorg/10.1109/CSE.2012.6227127 Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis [28]Micha Sharir and Amir Pnueli.1981.Two approaches to interprocedural data flow For Software Tools and Engineering,PASTE'01,Snowbird,Utah,USA,June 18-19. analysis.Prentice-Hall,Chapter 7,189-234. 2001,John Field and Gregor Snelting (Eds.).ACM,54-61.https://doiorg/10.1145/ [29]Yannis Smaragdakis et al 2018.Doop:Framework for Java pointer analysis 379605.379665 http://doop.program-analysis.org. [13]Simon Holm Jensen,Anders Meller,and Peter Thiemann.2009.Type analysis [30]Yannis Smaragdakis and George Balatsouras.2015.Pointer analysis.Foundations for JavaScript.In Static Analysis,16th International Symposium,SAS 2009,Los and Trends in Programming Languages 2,1 (2015),1-69.https://doi.org/10.1561/ 250G00B14 Angeles,CA,USA,August 9-11,2009.Proceedings (Lecture Notes in Computer Science).Jens Palsberg and Zhendong Su (Eds.),Vol.5673.Springer,238-255. [31]Yannis Smaragdakis,George Bala s,George Kastrinis,and Martin Braven httpss/doi.org/10.1007/978-3-642-03237-0_17 boer.2015.More sound static handling of Java reflection.In Programming [14]Sehun Jeong.Minseok Jeon,Sung Deok Cha,and Hakjoo Oh.2017.Data-driven nguages and Systems-13th Asian Symposium,APLAS 2015,Poha ng,South context-sensitivity for points-to analysis.PACMPL 1,OOPSLA (2017),100:1- Korea,November 30-December 2,2015,Proceedings (Lecture Notes in Computer 100:28.httos//doi.og/10.1145/3133924 Science),Xinyu Feng and Sungwoo Park (Eds.).Vol.9458.Springer,485-503. [15]George Kastrinis and Yannis Smaragdakis.2013.Hybrid context-sensitivity for https:/doi.org/10.1007/978-3-319-26529-2_26 points-to analysis.In ACM SIGPLAN Conference on Programming Language Design [32]Yannis Smaragdakis,Martin Bravenboer,and Ondrej Lhotak.2011.Pick your and Implementation,PLDI3.Seattle,WA.USA,June16-19,2013,Hans-Juergen contexts well:understanding object-sensitivity.In Proceedings of the 38th ACM Boehm a nd Cormac Flanagan(Eds.).ACM,423-434.https://doi.org/10.1 SIGPLAN-SIGACT Symposium on Principles of Programming Languages,POPL 24621562462191 2011,Austin,TX,USA,January 26-28,2011,Thomas Ball and Mooly Sagiv (Eds.). ACM,17-30.https:/doi.org/10.1145/1926385.1926390 139Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity ESEC/FSE ’18, November 4–9, 2018, Lake Buena Vista, FL, USA REFERENCES [1] Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick D. McDaniel. 2014. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’14, Edinburgh, United Kingdom - June 09 - 11, 2014, Michael F. P. O’Boyle and Keshav Pingali (Eds.). ACM, 259ś269. https: //doi.org/10.1145/2594291.2594299 [2] Marc Berndl, Ondrej Lhoták, Feng Qian, Laurie J. Hendren, and Navindra Umanee. 2003. Points-to analysis using BDDs. In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, San Diego, California, USA, June 9-11, 2003, Ron Cytron and Rajiv Gupta (Eds.). ACM, 103ś 114. https://doi.org/10.1145/781131.781144 [3] Stephen M. Blackburn, Robin Garner, Chris Hoffmann, Asjad M. Khan, Kathryn S. McKinley, Rotem Bentzur, Amer Diwan, Daniel Feinberg, Daniel Frampton, Samuel Z. Guyer, Martin Hirzel, Antony L. Hosking, Maria Jump, Han Bok Lee, J. Eliot B. Moss, Aashish Phansalkar, Darko Stefanovic, Thomas VanDrunen, Daniel von Dincklage, and Ben Wiedermann. 2006. The DaCapo benchmarks: Java benchmarking development and analysis. In Proceedings of the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2006, October 22-26, 2006, Portland, Oregon, USA, Peri L. Tarr and William R. Cook (Eds.). ACM, 169ś190. https://doi.org/10.1145/1167473.1167488 [4] Martin Bravenboer and Yannis Smaragdakis. 2009. Strictly declarative specification of sophisticated points-to analyses. In Proceedings of the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, Shail Arora and Gary T. Leavens (Eds.). ACM, 243ś262. https://doi.org/10.1145/1640089. 1640108 [5] Satish Chandra, Stephen J. Fink, and Manu Sridharan. 2009. Snugglebug: a powerful approach to weakest preconditions. In Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, Dublin, Ireland, June 15-21, 2009, Michael Hind and Amer Diwan (Eds.). ACM, 363ś374. https://doi.org/10.1145/1542476.1542517 [6] David R. Chase, Mark N. Wegman, and F. Kenneth Zadeck. 1990. Analysis of pointers and structures. In Proceedings of the ACM SIGPLAN’90 Conference on Programming Language Design and Implementation (PLDI), White Plains, New York, USA, June 20-22, 1990, Bernard N. Fischer (Ed.). ACM, 296ś310. https: //doi.org/10.1145/93542.93585 [7] Julian Dolby et al. 2018. WALA: T. J. Watson Libraries for Analysis. http://wala. sf.net. [8] Stephen J. Fink, Eran Yahav, Nurit Dor, G. Ramalingam, and Emmanuel Geay. 2008. Effective typestate verification in the presence of aliasing. ACM Trans. Softw. Eng. Methodol. 17, 2 (2008), 9:1ś9:34. https://doi.org/10.1145/1348250.1348255 [9] Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, and Martin C. Rinard. 2015. Information flow analysis of Android applications in DroidSafe. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8- 11, 2015. The Internet Society. https://www.ndss-symposium.org/ndss2015/ information-flow-analysis-android-applications-droidsafe [10] Neville Grech and Yannis Smaragdakis. 2017. P/Taint: unified points-to and taint analysis. PACMPL 1, OOPSLA (2017), 102:1ś102:28. https://doi.org/10.1145/ 3133926 [11] Behnaz Hassanshahi, Raghavendra Kagalavadi Ramesh, Padmanabhan Krishnan, Bernhard Scholz, and Yi Lu. 2017. An efficient tunable selective pointsto analysis for large codebases. In Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP@PLDI 2017, Barcelona, Spain, June 18, 2017, Karim Ali and Cristina Cifuentes (Eds.). ACM, 13ś18. https://doi.org/10.1145/3088515.3088519 [12] Michael Hind. 2001. Pointer analysis: haven’t we solved this problem yet?. In Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, PASTE’01, Snowbird, Utah, USA, June 18-19, 2001, John Field and Gregor Snelting (Eds.). ACM, 54ś61. https://doi.org/10.1145/ 379605.379665 [13] Simon Holm Jensen, Anders Mùller, and Peter Thiemann. 2009. Type analysis for JavaScript. In Static Analysis, 16th International Symposium, SAS 2009, Los Angeles, CA, USA, August 9-11, 2009. Proceedings (Lecture Notes in Computer Science), Jens Palsberg and Zhendong Su (Eds.), Vol. 5673. Springer, 238ś255. https://doi.org/10.1007/978-3-642-03237-0_17 [14] Sehun Jeong, Minseok Jeon, Sung Deok Cha, and Hakjoo Oh. 2017. Data-driven context-sensitivity for points-to analysis. PACMPL 1, OOPSLA (2017), 100:1ś 100:28. https://doi.org/10.1145/3133924 [15] George Kastrinis and Yannis Smaragdakis. 2013. Hybrid context-sensitivity for points-to analysis. In ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’13, Seattle, WA, USA, June 16-19, 2013, Hans-Juergen Boehm and Cormac Flanagan (Eds.). ACM, 423ś434. https://doi.org/10.1145/ 2462156.2462191 [16] Ondrej Lhoták and Laurie J. Hendren. 2003. Scaling Java points-to analysis using SPARK. In Compiler Construction, 12th International Conference, CC 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings (Lecture Notes in Computer Science), Görel Hedin (Ed.), Vol. 2622. Springer, 153ś169. https://doi.org/10.1007/ 3-540-36579-6_12 [17] Ondrej Lhoták and Laurie J. Hendren. 2006. Context-sensitive points-to analysis: Is it worth it?. In Compiler Construction, 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 30-31, 2006, Proceedings (Lecture Notes in Computer Science), Alan Mycroft and Andreas Zeller (Eds.), Vol. 3923. Springer, 47ś64. https://doi.org/10.1007/11688839_5 [18] Lian Li, Cristina Cifuentes, and Nathan Keynes. 2011. Boosting the performance of flow-sensitive points-to analysis using value flow. In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC/FSE ’11). ACM, New York, NY, USA, 343ś353. https://doi.org/10.1145/2025113.2025160 [19] Yue Li, Tian Tan, Yulei Sui, and Jingling Xue. 2014. Self-inferencing reflection resolution for Java. In ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28 - August 1, 2014. Proceedings (Lecture Notes in Computer Science), Richard E. Jones (Ed.), Vol. 8586. Springer, 27ś53. https: //doi.org/10.1007/978-3-662-44202-9_2 [20] Yue Li, Tian Tan, and Jingling Xue. 2015. Effective soundness-guided reflection analysis. In Static Analysis - 22nd International Symposium, SAS 2015, Saint-Malo, France, September 9-11, 2015, Proceedings (Lecture Notes in Computer Science), Sandrine Blazy and Thomas Jensen (Eds.), Vol. 9291. Springer, 162ś180. https: //doi.org/10.1007/978-3-662-48288-9_10 [21] Yue Li, Tian Tan, Yifei Zhang, and Jingling Xue. 2016. Program tailoring: Slicing by sequential criteria. In 30th European Conference on Object-Oriented Programming, ECOOP 2016, July 18-22, 2016, Rome, Italy (LIPIcs), Shriram Krishnamurthi and Benjamin S. Lerner (Eds.), Vol. 56. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 15:1ś15:27. https://doi.org/10.4230/LIPIcs.ECOOP.2016.15 [22] Donglin Liang and Mary Jean Harrold. 1999. Efficient points-to analysis for wholeprogram analysis. In Software Engineering - ESEC/FSE’99, 7th European Software Engineering Conference, Held Jointly with the 7th ACM SIGSOFT Symposium on the Foundations of Software Engineering, Toulouse, France, September 1999, Proceedings (Lecture Notes in Computer Science), Oscar Nierstrasz and Michel Lemoine (Eds.), Vol. 1687. Springer, 199ś215. https://doi.org/10.1007/3-540-48166-4_13 [23] Benjamin Livshits and Monica S. Lam. 2005. Finding security vulnerabilities in Java applications with static analysis. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005, Patrick D. McDaniel (Ed.). USENIX Association. [24] Ana Milanova, Atanas Rountev, and Barbara G. Ryder. 2002. Parameterized object sensitivity for points-to and side-effect analyses for Java. In Proceedings of the International Symposium on Software Testing and Analysis, ISSTA 2002, Roma, Italy, July 22-24, 2002, Phyllis G. Frankl (Ed.). ACM, 1ś11. https://doi.org/10. 1145/566172.566174 [25] Ana Milanova, Atanas Rountev, and Barbara G. Ryder. 2005. Parameterized object sensitivity for points-to analysis for Java. ACM Trans. Softw. Eng. Methodol. 14, 1 (2005), 1ś41. https://doi.org/10.1145/1044834.1044835 [26] Mayur Naik, Alex Aiken, and John Whaley. 2006. Effective static race detection for Java. In Proceedings of the ACM SIGPLAN 2006 Conference on Programming Language Design and Implementation, Ottawa, Ontario, Canada, June 11-14, 2006, Michael I. Schwartzbach and Thomas Ball (Eds.). ACM, 308ś319. https://doi.org/ 10.1145/1133981.1134018 [27] Michael Pradel, Ciera Jaspan, Jonathan Aldrich, and Thomas R. Gross. 2012. Statically checking API protocol conformance with mined multi-object specifications. In 34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland, Martin Glinz, Gail C. Murphy, and Mauro Pezzè (Eds.). IEEE Computer Society, 925ś935. https://doi.org/10.1109/ICSE.2012.6227127 [28] Micha Sharir and Amir Pnueli. 1981. Two approaches to interprocedural data flow analysis. Prentice-Hall, Chapter 7, 189ś234. [29] Yannis Smaragdakis et al. 2018. Doop: Framework for Java pointer analysis. http://doop.program-analysis.org. [30] Yannis Smaragdakis and George Balatsouras. 2015. Pointer analysis. Foundations and Trends in Programming Languages 2, 1 (2015), 1ś69. https://doi.org/10.1561/ 2500000014 [31] Yannis Smaragdakis, George Balatsouras, George Kastrinis, and Martin Bravenboer. 2015. More sound static handling of Java reflection. In Programming Languages and Systems - 13th Asian Symposium, APLAS 2015, Pohang, South Korea, November 30 - December 2, 2015, Proceedings (Lecture Notes in Computer Science), Xinyu Feng and Sungwoo Park (Eds.), Vol. 9458. Springer, 485ś503. https://doi.org/10.1007/978-3-319-26529-2_26 [32] Yannis Smaragdakis, Martin Bravenboer, and Ondrej Lhoták. 2011. Pick your contexts well: understanding object-sensitivity. In Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011, Austin, TX, USA, January 26-28, 2011, Thomas Ball and Mooly Sagiv (Eds.). ACM, 17ś30. https://doi.org/10.1145/1926385.1926390 139