Class Hierarchy Complementation: Soundly Completing a Partial Type Graph

Size: px
Start display at page:

Download "Class Hierarchy Complementation: Soundly Completing a Partial Type Graph"

Transcription

1 Class Hierarchy Complementation: Soundly Completing a Partial Type Graph George Balatsouras Yannis Smaragdakis University of Athens OOPSLA 2013

2 Motivation: Static Analysis Static Analysis using the Doop framework Analyzes Java programs Uses Soot to analyze bytecode Whole-program analysis External dependencies Missing libraries / class defs INPUT uses LIB A uses PHANTOM CLASSES LIB B Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 2

3 Motivation: Static Analysis Soot FAQ How do I modify the code in order to enable soot to continue loading a class even if it doesn t find some of it[s] references? Can I create a dummy soot class so it can continue with the load? How? Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 3

4 Motivation: Static Analysis Soot FAQ How do I modify the code in order to enable soot to continue loading a class even if it doesn t find some of it[s] references? Can I create a dummy soot class so it can continue with the load? How? You can try -use-phantom-refs but often that does not work because not all analyses can cope with such references. Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 4

5 Complementation Problem Partial Program + Phantom Classes??? Complete Program Valid Java bytecode JVM Standard Verifiable Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 5

6 Complementation Problem Partial Program + Phantom Classes JPhantom Complete Program Valid Java bytecode JVM Standard Verifiable Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 7

7 JPhantom: Approach 1. Detect every phantom reference 2. Generate minimal classes (empty method bodies) that respect the: i. referenced member signatures ii. implied type hierarchy Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 8

8 X, Y, Z phantom classes public void foo(x, Y) : Motivating Example aload_2 // load 2 nd arg (Y) into stack aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()`... Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 9

9 Symbolic Execution: Step 1 X, Y, Z phantom classes public void foo(x, Y) : Stack aload_2 // load 2 nd arg (Y) into stack aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()`... Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 10

10 Symbolic Execution: Step 2 X, Y, Z phantom classes public void foo(x, Y) : aload_2 // load 2 nd arg (Y) into stack Stack Y aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()`... Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 11

11 Symbolic Execution: Step 3 X, Y, Z phantom classes public void foo(x, Y) : aload_2 // load 2 nd arg (Y) into stack Y aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()`... Stack X Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 12

12 Symbolic Execution: Step 3 X, Y, Z phantom classes public void foo(x, Y) : Stack aload_2 // load 2 nd arg (Y) into stack Y aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()` X... Method bar: expects an argument of type A receives an argument of type Y upcast Constraints X has to be a class (and not an interface). X has to provide a method: Z bar(a) Y has to be a subtype of A Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 13

13 Symbolic Execution: Step 4 X, Y, Z phantom classes public void foo(x, Y) : aload_2 // load 2 nd arg (Y) into stack Stack Z aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()`... Constraints X has to be a class (and not an interface). X has to provide a method: Z bar(a) Y has to be a subtype of A Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 14

14 Symbolic Execution: Step 4 X, Y, Z phantom classes public void foo(x, Y) : aload_2 // load 2 nd arg (Y) into stack Stack Z aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()`... Method baz: declares a receiver of type B is called by an object of type Z Constraints X has to be a class (and not an interface). X has to provide a method: Z bar(a) Y has to be a subtype of A Z has to be a subtype of B Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 15

15 Symbolic Execution: Step 5 X, Y, Z phantom classes public void foo(x, Y) : Stack aload_2 // load 2 nd arg (Y) into stack aload_1 // load 1 st arg (X) into stack invokevirtual `Z X.bar(A)` invokevirtual `void B.baz()`... Constraints X has to be a class (and not an interface). X has to provide a method: Z bar(a) Y has to be a subtype of A Z has to be a subtype of B Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 16

16 Hierarchy Complementation Partial Type Graph + subtyping constraints E.g., <A> has to be a (transitive) subtype of <B> JPhantom Complete Hierarchy Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 17

17 Multiple Inheritance

18 Multiple Inheritance Wait a minute. Aren't we talking about Java?

19 Multiple Inheritance Wait a minute. Aren't we talking about Java? Interfaces

20 Multiple Inheritance Problem Constraint Graph Known Class Phantom Class Direct Edge Path Edge DAG Input Cannot alter outgoing edges of known nodes Output Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 21

21 Projection Sets Known Class Phantom Class Direct Edge Path Edge The phantom projection set of A is {B,C,D}. In order to satisfy path-edge (A,E) we can either add an edge (B,E), (C,E), or (D,E). Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 22

22 Multiple Inheritance Key Idea Stratification exists for any solution Edges facing upwards property No cycles strata Solution Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 23

23 Multiple Inheritance Algorithm Construct valid stratification iteratively Keep nodes at minimum height Keep edges facing upwards Advance node only to satisfy constraint Fixpoint Add upward edges to satisfy path constraints Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 24

24 Multiple Inheritance Example Step 1 Known Class Phantom Class Direct Edge Path Edge Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 25

25 Multiple Inheritance Example Step 1 Known Class Phantom Class Direct Edge Path Edge Random? Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 26

26 Multiple Inheritance Example Step 1 Known Class Phantom Class Direct Edge Path Edge Random? Not really. Happens to be topologically sorted. Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 27

27 Multiple Inheritance Example Step 1 Isn't that enough? Known Class Phantom Class Direct Edge Path Edge Happens to be topologically sorted. Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 28

28 Multiple Inheritance Example Step 1 Isn't that enough? Known Class Phantom Class Direct Edge Path Edge Path-edge (A,B) cannot be satisfied since both C and E are after B. Happens to be topologically sorted. Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 29

29 Multiple Inheritance Example Step 1 Isn't that enough? Known Class Phantom Class Direct Edge Path Edge Path-edge (A,B) cannot be satisfied since both C and E are after B. NO!! Happens to be topologically sorted. Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 30

30 Multiple Inheritance Example Step 1 All nodes except A, and D have incoming (horizontal) egdes Known Class Phantom Class Direct Edge Path Edge Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 31

31 Multiple Inheritance Example Step 2 Known Class Phantom Class Direct Edge Path Edge E C B F A D Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 32

32 Multiple Inheritance Example Step 2 Nodes C, F have incoming (horizontal) egdes Node B is not yet higher than neither C nor E Known Class Phantom Class Direct Edge Path Edge E C B F A D Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 33

33 Multiple Inheritance Example Step 3 C B F Known Class Phantom Class Direct Edge Path Edge E A D Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 34

34 Multiple Inheritance Example Step 3 Nodes C, F have incoming (horizontal) egdes C B F Known Class Phantom Class Direct Edge Path Edge E A D Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 35

35 Multiple Inheritance Example Step 4 C B F Known Class Phantom Class Direct Edge Path Edge E A D Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 36

36 Multiple Inheritance Example Step 4 Final stratification C B F Known Class Phantom Class Direct Edge Path Edge E A D Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 37

37 Multiple Inheritance Example Solution Path-edge (A,B) satisfied through path (A,E,B) C B F Known Class Phantom Class Direct Edge Path Edge E A D Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 38

38 Single Inheritance Classes

39 Multiple vs Single Inheritance Just one additional constraint on the output...which now has to form a DAG Tree Multiple Inheritance Single Inheritance Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 40

40 Single Inheritance: Examples * X, Y subtype-related if X subtype or supertype of Y Must be subtype-related * Known Class Phantom Class Direct Edge Path Edge Cannot be subtype-related * Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 41

41 JPhantom: Algorithms Solvers Single inheritance Polynomial if no direct-edges to phantom-nodes Worst-case exponential (backtracking) Quite effective in practice Multiple inheritance Polynomial Single inheritance, multiple subtyping (e.g., Java) Decompose into a single and a multiple inheritance subproblems Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 43

42 JPhantom: Overview About JPhantom Solves the hierarchy complementation problem for all 3 settings Uses the ASM framework to operate on bytecode Constraint Extraction Step Detects type constraints and missing member references Code Generation Step Generates dummy classes, yet consistent with our input Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 47

43 JPhantom: Performance About JPhantom Highly Scalable runs in mere seconds even for large applications and complex constraints 148 phantom classes and 212 constraints, where execution time < 2sec, for logback-classic Maximum execution time of 14s for JRuby 19MB binary Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 48

44 Summary In summary, we: Introduce the class hierarchy complementation problem Provide algorithms for: i. single inheritance ii. multiple inheritance, and iii. single inheritance multiple subtyping Implement our algorithms in JPhantom, a practical tool for program complementation highly scalable meets Java bytecode requirements Class Hierarchy Complementation: Soundly Completing a Partial Type Graph 49

Java TM. Multi-Dispatch in the. Virtual Machine: Design and Implementation. Computing Science University of Saskatchewan

Java TM. Multi-Dispatch in the. Virtual Machine: Design and Implementation. Computing Science University of Saskatchewan Multi-Dispatch in the Java TM Virtual Machine: Design and Implementation Computing Science University of Saskatchewan Chris Dutchyn (dutchyn@cs.ualberta.ca) September 22, 08 Multi-Dispatch in the Java

More information

Exercise 7 Bytecode Verification self-study exercise sheet

Exercise 7 Bytecode Verification self-study exercise sheet Concepts of ObjectOriented Programming AS 2018 Exercise 7 Bytecode Verification selfstudy exercise sheet NOTE: There will not be a regular exercise session on 9th of November, because you will take the

More information

Taming the Wildcards

Taming the Wildcards Taming the Wildcards Combining Definition- and Use-Site Variance John Altidor 1, Shan Shan Huang 2, and Yannis Smaragdakis 1,3 University of Massachusetts Amherst 1 LogicBlox Inc. 2 University of Athens,

More information

Pointer Analysis for C/C++ with cclyzer. George Balatsouras University of Athens

Pointer Analysis for C/C++ with cclyzer. George Balatsouras University of Athens Pointer Analysis for C/C++ with cclyzer George Balatsouras University of Athens Analyzes C/C++ programs translated to LLVM Bitcode Declarative framework Analyzes written in Datalog

More information

Soot A Java Bytecode Optimization Framework. Sable Research Group School of Computer Science McGill University

Soot A Java Bytecode Optimization Framework. Sable Research Group School of Computer Science McGill University Soot A Java Bytecode Optimization Framework Sable Research Group School of Computer Science McGill University Goal Provide a Java framework for optimizing and annotating bytecode provide a set of API s

More information

CO444H. Ben Livshits. Datalog Pointer analysis

CO444H. Ben Livshits. Datalog Pointer analysis CO444H Ben Livshits Datalog Pointer analysis 1 Call Graphs Class analysis: Given a reference variable x, what are the classes of the objects that x refers to at runtime? We saw CHA and RTA Deal with polymorphic/virtual

More information

Space Exploration EECS /25

Space Exploration EECS /25 1/25 Space Exploration EECS 4315 www.eecs.yorku.ca/course/4315/ Nondeterminism 2/25 Nondeterministic code is code that, even for the same input, can exhibit different behaviours on different runs, as opposed

More information

Java Wildcards Meet Definition-Site Variance

Java Wildcards Meet Definition-Site Variance Java Wildcards Meet Definition-Site Variance John Altidor 1 Christoph Reichenbach 2,1 Yannis Smaragdakis 3,1 1 University of Massachusetts 2 Google 3 University of Athens Outline Motivation for Variance.

More information

Foo A Minimal Modern OO Calculus

Foo A Minimal Modern OO Calculus Foo A Minimal Modern OO Calculus Prodromos Gerakios George Fourtounis Yannis Smaragdakis Department of Informatics University of Athens {pgerakios,gfour,smaragd}@di.uoa.gr 1 / 24 What A core OO calculus

More information

INHERITANCE & POLYMORPHISM. INTRODUCTION IB DP Computer science Standard Level ICS3U. INTRODUCTION IB DP Computer science Standard Level ICS3U

INHERITANCE & POLYMORPHISM. INTRODUCTION IB DP Computer science Standard Level ICS3U. INTRODUCTION IB DP Computer science Standard Level ICS3U C A N A D I A N I N T E R N A T I O N A L S C H O O L O F H O N G K O N G INHERITANCE & POLYMORPHISM P2 LESSON 12 P2 LESSON 12.1 INTRODUCTION inheritance: OOP allows a programmer to define new classes

More information

CS 445: Data Structures Final Examination: Study Guide

CS 445: Data Structures Final Examination: Study Guide CS 445: Data Structures Final Examination: Study Guide Java prerequisites Classes, objects, and references Access modifiers Arguments and parameters Garbage collection Self-test questions: Appendix C Designing

More information

Last name:... First name:... Department (if not D-INFK):...

Last name:... First name:... Department (if not D-INFK):... Concepts of Object-Oriented Programming AS 2016 Concepts of Object-Oriented Programming Midterm Examination 11.11.2016 Prof. Dr. Peter Müller Last name:................................. First name:.................................

More information

Reference Analyses. VTA - Variable Type Analysis

Reference Analyses. VTA - Variable Type Analysis Reference Analyses Variable Type Analysis for Java Related points-to analyses for C Steengaard Andersen Field-sensitive points-to for Java Object-sensitive points-to for Java Other analysis approaches

More information

Last name:... First name:... Department (if not D-INFK):...

Last name:... First name:... Department (if not D-INFK):... Concepts of Object-Oriented Programming AS 2017 Concepts of Object-Oriented Programming Midterm Examination 10.11.2017 Prof. Dr. Peter Müller Last name:................................. First name:.................................

More information

Recursion. COMS W1007 Introduction to Computer Science. Christopher Conway 26 June 2003

Recursion. COMS W1007 Introduction to Computer Science. Christopher Conway 26 June 2003 Recursion COMS W1007 Introduction to Computer Science Christopher Conway 26 June 2003 The Fibonacci Sequence The Fibonacci numbers are: 1, 1, 2, 3, 5, 8, 13, 21, 34,... We can calculate the nth Fibonacci

More information

JSR 292 and companions Rémi Forax FOSDEM'09

JSR 292 and companions Rémi Forax FOSDEM'09 JSR 292 and companions Rémi Forax FOSDEM'09 Da Vinci Mission Prototype (J)VM extensions to run non-java languages efficiently Complete the existing architecture with general purpose extensions New languages

More information

QUIZ 2 Introduction to Computer Science (COMP 250) Mon. March 2, 2009 Professor Michael Langer

QUIZ 2 Introduction to Computer Science (COMP 250) Mon. March 2, 2009 Professor Michael Langer QUIZ 2 Introduction to Computer Science (COMP 250) Mon. March 2, 2009 Professor Michael Langer STUDENT NAME: ID: The exam consists of five questions. There are a total of 10 points. You may use the back

More information

More on Inheritance. Interfaces & Abstract Classes

More on Inheritance. Interfaces & Abstract Classes More on Inheritance Interfaces & Abstract Classes Java interfaces A Java interface is used to specify minimal functionality that a client requires of a server. A Java interface contains: method specifications

More information

Java byte code verification

Java byte code verification Java byte code verification SOS Master Science Informatique U. Rennes 1 Thomas Jensen SOS Java byte code verification 1 / 26 Java security architecture Java: programming applications with code from different

More information

FINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 ( Marks: 1 ) - Please choose one The data of the problem is of 2GB and the hard

FINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 ( Marks: 1 ) - Please choose one The data of the problem is of 2GB and the hard FINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 The data of the problem is of 2GB and the hard disk is of 1GB capacity, to solve this problem we should Use better data structures

More information

Abstract Classes. Abstract Classes a and Interfaces. Class Shape Hierarchy. Problem AND Requirements. Abstract Classes.

Abstract Classes. Abstract Classes a and Interfaces. Class Shape Hierarchy. Problem AND Requirements. Abstract Classes. a and Interfaces Class Shape Hierarchy Consider the following class hierarchy Shape Circle Square Problem AND Requirements Suppose that in order to exploit polymorphism, we specify that 2-D objects must

More information

(Computer Science & Engineering)

(Computer Science & Engineering) (Computer Science & Engineering) 1. The number of equivalence relations of the set { 1, 2, 3, 4} is a) 1 b) 16 c) 12 d) none of these 2. Cordiality of the set in {a, b, c}, {a,, d}, {, { }, { { } } } a)

More information

CS-202 Introduction to Object Oriented Programming

CS-202 Introduction to Object Oriented Programming CS-202 Introduction to Object Oriented Programming California State University, Los Angeles Computer Science Department Lecture III Inheritance and Polymorphism Introduction to Inheritance Introduction

More information

Java Instrumentation for Dynamic Analysis

Java Instrumentation for Dynamic Analysis Java Instrumentation for Dynamic Analysis and Michael Ernst MIT CSAIL Page 1 Java Instrumentation Approaches Instrument source files Java Debug Interface (JDI) Instrument class files Page 2 Advantages

More information

Bottom-up Context-Sensitive Pointer Analysis for Java

Bottom-up Context-Sensitive Pointer Analysis for Java Bottom-up Context-Sensitive Pointer Analysis for Java Yu Feng, Xinyu Wang, Isil Dillig and Thomas Dillig UT Austin 1 What is this talk about? Pointer analysis Given a program variable v, what are the heap

More information

The JVM is not observable enough (and what to do about it)

The JVM is not observable enough (and what to do about it) The JVM is not observable enough (and what to do about it) Stephen Kell stephen.kell@usi.ch University of Lugano joint work with: Danilo Ansaloni, Walter Binder, Lukáš Marek The JVM is... p.1/20 0xcafebabe

More information

Every language has its own scoping rules. For example, what is the scope of variable j in this Java program?

Every language has its own scoping rules. For example, what is the scope of variable j in this Java program? Lexical Binding There are two ways a variable can be used in a program: As a declaration As a "reference" or use of the variable Scheme has two kinds of variable "declarations" -- the bindings of a let-expression

More information

Directed Acyclic Graphs & Topological Sort

Directed Acyclic Graphs & Topological Sort Directed Acyclic Graphs & Topological Sort CS6: Introduction to Data Structures & Algorithms Spring 08 Outline Directed Acyclic Graphs Topological Sort Hand-simulation Pseudo-code Runtime analysis 4 Directed

More information

AP Computer Science 4325

AP Computer Science 4325 4325 Instructional Unit Algorithm Design Techniques -divide-and-conquer The students will be -Decide whether an algorithm -classroom discussion -backtracking able to classify uses divide-and-conquer, -worksheets

More information

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder MCA Lateral 1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder 2. What would be the output of the following C program? main ( ){ int

More information

Delft-Java Link Translation Buffer

Delft-Java Link Translation Buffer Delft-Java Link Translation Buffer John Glossner 1,2 and Stamatis Vassiliadis 2 1 Lucent / Bell Labs Advanced DSP Architecture and Compiler Research Allentown, Pa glossner@lucent.com 2 Delft University

More information

Chapter 11 Inheritance and Polymorphism. Motivations. Suppose you will define classes to model circles,

Chapter 11 Inheritance and Polymorphism. Motivations. Suppose you will define classes to model circles, Chapter 11 Inheritance and Polymorphism 1 Motivations Suppose you will define classes to model circles, rectangles, and triangles. These classes have many common features. What is the best way to design

More information

CS107 Handout 37 Spring 2007 May 25, 2007 Introduction to Inheritance

CS107 Handout 37 Spring 2007 May 25, 2007 Introduction to Inheritance CS107 Handout 37 Spring 2007 May 25, 2007 Introduction to Inheritance Handout written by Julie Zelenski, updated by Jerry. Inheritance is a language property most gracefully supported by the object-oriented

More information

Inheritance and Interfaces

Inheritance and Interfaces Inheritance and Interfaces Object Orientated Programming in Java Benjamin Kenwright Outline Review What is Inheritance? Why we need Inheritance? Syntax, Formatting,.. What is an Interface? Today s Practical

More information

First IS-A Relationship: Inheritance

First IS-A Relationship: Inheritance First IS-A Relationship: Inheritance The relationships among Java classes form class hierarchy. We can define new classes by inheriting commonly used states and behaviors from predefined classes. A class

More information

Arrays. Comp Sci 1570 Introduction to C++ Array basics. arrays. Arrays as parameters to functions. Sorting arrays. Random stuff

Arrays. Comp Sci 1570 Introduction to C++ Array basics. arrays. Arrays as parameters to functions. Sorting arrays. Random stuff and Arrays Comp Sci 1570 Introduction to C++ Outline and 1 2 Multi-dimensional and 3 4 5 Outline and 1 2 Multi-dimensional and 3 4 5 Array declaration and An array is a series of elements of the same type

More information

Total Score /1 /20 /41 /15 /23 Grader

Total Score /1 /20 /41 /15 /23 Grader NAME: NETID: CS2110 Spring 2015 Prelim 2 April 21, 2013 at 5:30 0 1 2 3 4 Total Score /1 /20 /41 /15 /23 Grader There are 5 questions numbered 0..4 on 8 pages. Check now that you have all the pages. Write

More information

Algorithms. Ch.15 Dynamic Programming

Algorithms. Ch.15 Dynamic Programming Algorithms Ch.15 Dynamic Programming Dynamic Programming Not a specific algorithm, but a technique (like divide-and-conquer). Developed back in the day when programming meant tabular method (like linear

More information

Notes from a Short Introductory Lecture on Scala (Based on Programming in Scala, 2nd Ed.)

Notes from a Short Introductory Lecture on Scala (Based on Programming in Scala, 2nd Ed.) Notes from a Short Introductory Lecture on Scala (Based on Programming in Scala, 2nd Ed.) David Haraburda January 30, 2013 1 Introduction Scala is a multi-paradigm language that runs on the JVM (is totally

More information

Operators and Expressions

Operators and Expressions Operators and Expressions Conversions. Widening and Narrowing Primitive Conversions Widening and Narrowing Reference Conversions Conversions up the type hierarchy are called widening reference conversions

More information

An Introduction to Multicodes. Ben Stephenson Department of Computer Science University of Western Ontario

An Introduction to Multicodes. Ben Stephenson Department of Computer Science University of Western Ontario An Introduction to Multicodes Ben Stephenson Department of Computer Science University of Western Ontario ben@csd csd.uwo.ca Outline Java Virtual Machine Background The Current State of the Multicode Art

More information

Overview of Java s Support for Polymorphism

Overview of Java s Support for Polymorphism Overview of Java s Support for Polymorphism Douglas C. Schmidt d.schmidt@vanderbilt.edu www.dre.vanderbilt.edu/~schmidt Professor of Computer Science Institute for Software Integrated Systems Vanderbilt

More information

Inheritance and Polymorphism

Inheritance and Polymorphism Inheritance and Polymorphism Dr. M. G. Abbas Malik Assistant Professor Faculty of Computing and IT (North Jeddah Branch) King Abdulaziz University, Jeddah, KSA mgmalik@kau.edu.sa www.sanlp.org/malik/cpit305/ap.html

More information

Parametric Polymorphism for Java: A Reflective Approach

Parametric Polymorphism for Java: A Reflective Approach Parametric Polymorphism for Java: A Reflective Approach By Jose H. Solorzano and Suad Alagic Presented by Matt Miller February 20, 2003 Outline Motivation Key Contributions Background Parametric Polymorphism

More information

Section: Inheritance Heck

Section: Inheritance Heck Section: Inheritance Heck Inheritance Heck (previously named slightly differently) refers to seemingly complex and contradictory behavior by the compiler and runtime system when resolving types and methods

More information

Records. ADTs. Objects as Records. Objects as ADTs. Objects CS412/CS413. Introduction to Compilers Tim Teitelbaum. Lecture 15: Objects 25 Feb 05

Records. ADTs. Objects as Records. Objects as ADTs. Objects CS412/CS413. Introduction to Compilers Tim Teitelbaum. Lecture 15: Objects 25 Feb 05 Records CS412/CS413 Introduction to Compilers Tim Teitelbaum Lecture 15: Objects 25 Feb 05 Objects combine features of records and abstract data types Records = aggregate data structures Combine several

More information

CS 215 Software Design Homework 3 Due: February 28, 11:30 PM

CS 215 Software Design Homework 3 Due: February 28, 11:30 PM CS 215 Software Design Homework 3 Due: February 28, 11:30 PM Objectives Specifying and checking class invariants Writing an abstract class Writing an immutable class Background Polynomials are a common

More information

11. Arrays. For example, an array containing 5 integer values of type int called foo could be represented as:

11. Arrays. For example, an array containing 5 integer values of type int called foo could be represented as: 11. Arrays An array is a series of elements of the same type placed in contiguous memory locations that can be individually referenced by adding an index to a unique identifier. That means that, for example,

More information

Type Hierarchy. Lecture 6: OOP, autumn 2003

Type Hierarchy. Lecture 6: OOP, autumn 2003 Type Hierarchy Lecture 6: OOP, autumn 2003 The idea Many types have common behavior => type families share common behavior organized into a hierarchy Most common on the top - supertypes Most specific at

More information

Arrays Classes & Methods, Inheritance

Arrays Classes & Methods, Inheritance Course Name: Advanced Java Lecture 4 Topics to be covered Arrays Classes & Methods, Inheritance INTRODUCTION TO ARRAYS The following variable declarations each allocate enough storage to hold one value

More information

Introduction Basic elements of Java

Introduction Basic elements of Java Software and Programming I Introduction Basic elements of Java Roman Kontchakov / Carsten Fuhs Birkbeck, University of London Module Information Time: Thursdays in the Spring term Lectures: MAL B04: 2

More information

Chapter 1 Getting Started

Chapter 1 Getting Started Chapter 1 Getting Started The C# class Just like all object oriented programming languages, C# supports the concept of a class. A class is a little like a data structure in that it aggregates different

More information

OOPLs - call graph construction. Example executed calls

OOPLs - call graph construction. Example executed calls OOPLs - call graph construction Compile-time analysis of reference variables and fields Problem: how to resolve virtual function calls? Need to determine to which objects (or types of objects) a reference

More information

- Modeling, Phase Transitions, Constraint and Complexity Analyses

- Modeling, Phase Transitions, Constraint and Complexity Analyses Flexible Methods for Multi-agent distributed resource Allocation by Exploiting Phase Transitions - Modeling, Phase Transitions, Constraint and Complexity Analyses Weixiong Zhang (PI) Washington University

More information

invokedynamic IN 45 MINUTES!!! Wednesday, February 6, 13

invokedynamic IN 45 MINUTES!!! Wednesday, February 6, 13 invokedynamic IN 45 MINUTES!!! Me Charles Oliver Nutter headius@headius.com, @headius blog.headius.com JRuby Guy at Sun, Engine Yard, Red Hat JVM enthusiast, educator, contributor Earliest adopter of invokedynamic

More information

Today. Instance Method Dispatch. Instance Method Dispatch. Instance Method Dispatch 11/29/11. today. last time

Today. Instance Method Dispatch. Instance Method Dispatch. Instance Method Dispatch 11/29/11. today. last time CS2110 Fall 2011 Lecture 25 Java program last time Java compiler Java bytecode (.class files) Compile for platform with JIT Interpret with JVM Under the Hood: The Java Virtual Machine, Part II 1 run native

More information

Constraint Satisfaction Problems. Chapter 6

Constraint Satisfaction Problems. Chapter 6 Constraint Satisfaction Problems Chapter 6 Constraint Satisfaction Problems A constraint satisfaction problem consists of three components, X, D, and C: X is a set of variables, {X 1,..., X n }. D is a

More information

What is Inheritance?

What is Inheritance? Inheritance 1 Agenda What is and Why Inheritance? How to derive a sub-class? Object class Constructor calling chain super keyword Overriding methods (most important) Hiding methods Hiding fields Type casting

More information

Extra notes on Field- sensitive points- to analysis with inclusion constraints Sept 9, 2015

Extra notes on Field- sensitive points- to analysis with inclusion constraints Sept 9, 2015 Extra notes on Field- sensitive points- to analysis with inclusion constraints Sept 9, 2015 Week 3 CS6304 The Rountev et al. paper at OOPSLA 2000 extended Andersen s points- to analysis for C programs

More information

SUMMARY: MODEL DRIVEN SECURITY

SUMMARY: MODEL DRIVEN SECURITY SUMMARY: MODEL DRIVEN SECURITY JAN-FILIP ZAGALAK, JZAGALAK@STUDENT.ETHZ.CH Model Driven Security: From UML Models to Access Control Infrastructres David Basin, Juergen Doser, ETH Zuerich Torsten lodderstedt,

More information

CSE 373: Data Structures and Algorithms. Memory and Locality. Autumn Shrirang (Shri) Mare

CSE 373: Data Structures and Algorithms. Memory and Locality. Autumn Shrirang (Shri) Mare CSE 373: Data Structures and Algorithms Memory and Locality Autumn 2018 Shrirang (Shri) Mare shri@cs.washington.edu Thanks to Kasey Champion, Ben Jones, Adam Blank, Michael Lee, Evan McCarty, Robbie Weber,

More information

Static Analysis of Dynamic Languages. Jennifer Strater

Static Analysis of Dynamic Languages. Jennifer Strater Static Analysis of Dynamic Languages Jennifer Strater 2017-06-01 Table of Contents Introduction............................................................................... 1 The Three Compiler Options...............................................................

More information

EXERCISES SOFTWARE DEVELOPMENT I. 10 Recursion, Binary (Search) Trees Towers of Hanoi // Tree Traversal 2018W

EXERCISES SOFTWARE DEVELOPMENT I. 10 Recursion, Binary (Search) Trees Towers of Hanoi // Tree Traversal 2018W EXERCISES SOFTWARE DEVELOPMENT I 10 Recursion, Binary (Search) Trees Towers of Hanoi // Tree Traversal 2018W Recursion I RECURSION :: MOTIVATION AND DEFINITION Many complex real-world problems can be solved

More information

Sorting. CSE 143 Java. Insert for a Sorted List. Insertion Sort. Insertion Sort As A Card Game Operation. CSE143 Au

Sorting. CSE 143 Java. Insert for a Sorted List. Insertion Sort. Insertion Sort As A Card Game Operation. CSE143 Au CSE 43 Java Sorting Reading: Ch. 3 & Sec. 7.3 Sorting Binary search is a huge speedup over sequential search But requires the list be sorted Slight Problem: How do we get a sorted list? Maintain the list

More information

Outline. Object Oriented Programming. Course goals. Staff. Course resources. Assignments. Course organization Introduction Java overview Autumn 2003

Outline. Object Oriented Programming. Course goals. Staff. Course resources. Assignments. Course organization Introduction Java overview Autumn 2003 Outline Object Oriented Programming Autumn 2003 2 Course goals Software design vs hacking Abstractions vs language (syntax) Java used to illustrate concepts NOT a course about Java Prerequisites knowledge

More information

Generic programming in OO Languages

Generic programming in OO Languages CS 242 2012 Generic programming in OO Languages Reading Text: Sections 9.4.1 and 9.4.3 J Koskinen, Metaprogramming in C++, Sections 2 5 Gilad Bracha, Generics in the Java Programming Language Questions

More information

Bugs in software. Using Static Analysis to Find Bugs. David Hovemeyer

Bugs in software. Using Static Analysis to Find Bugs. David Hovemeyer Bugs in software Programmers are smart people We have good techniques for finding bugs early: Unit testing, pair programming, code inspections So, most bugs should be subtle, and require sophisticated

More information

CPSC213/2014W1 Midterm EXTRA Practice

CPSC213/2014W1 Midterm EXTRA Practice CPSC213/2014W1 Midterm EXTRA Practice DEC/HEX/BIN NUMERACY 1. Convert into decimal: 1a. 0x33 1b. 0x57 1c. 0xaf 1d. 0x7a 1e. 0x1234 1f. 0x69bd 1g. 0x1a64 1h. 0xdead 2. Convert into hex numbers of the specified

More information

Compiler construction 2009

Compiler construction 2009 Compiler construction 2009 Lecture 6 Some project extensions. Pointers and heap allocation. Object-oriented languages. Module systems. Memory structure Javalette restrictions Only local variables and parameters

More information

Compilers. Type checking. Yannis Smaragdakis, U. Athens (original slides by Sam

Compilers. Type checking. Yannis Smaragdakis, U. Athens (original slides by Sam Compilers Type checking Yannis Smaragdakis, U. Athens (original slides by Sam Guyer@Tufts) Summary of parsing Parsing A solid foundation: context-free grammars A simple parser: LL(1) A more powerful parser:

More information

Emulating the Java ME Platform on Java SE

Emulating the Java ME Platform on Java SE Emulating the Java ME Platform on Java SE Kenneth Russell Tony Wyant Sun Microsystems, Inc. Session TS-2515 2007 JavaOne SM Conference Session TS-2515 Goal of This Talk Learn advanced uses of Java bytecode

More information

What is software testing? Software testing is designing, executing and evaluating test cases in order to detect faults.

What is software testing? Software testing is designing, executing and evaluating test cases in order to detect faults. ϖοιδ τεσταδδανδχουντ() { ασσερ τεθυαλσ(1, ο.αδδανδχουντ(νεω ΑρραψΛιστ()); ϖοιδ τεσταδδανδχουντ() { ασσερ τεθυαλσ(1, ο.αδδανδχουντ(νεω ΑρραψΛιστ()); ιντ αδδανδχουντ(λιστ λιστ) { ρετυρν λιστ.σιζε(); ιντ

More information

CS 315 Software Design Homework 3 Preconditions, Postconditions, Invariants Due: Sept. 29, 11:30 PM

CS 315 Software Design Homework 3 Preconditions, Postconditions, Invariants Due: Sept. 29, 11:30 PM CS 315 Software Design Homework 3 Preconditions, Postconditions, Invariants Due: Sept. 29, 11:30 PM Objectives Defining a wellformed method to check class invariants Using assert statements to check preconditions,

More information

The Java Language Implementation

The Java Language Implementation CS 242 2012 The Java Language Implementation Reading Chapter 13, sections 13.4 and 13.5 Optimizing Dynamically-Typed Object-Oriented Languages With Polymorphic Inline Caches, pages 1 5. Outline Java virtual

More information

Sorting. CSC 143 Java. Insert for a Sorted List. Insertion Sort. Insertion Sort As A Card Game Operation CSC Picture

Sorting. CSC 143 Java. Insert for a Sorted List. Insertion Sort. Insertion Sort As A Card Game Operation CSC Picture CSC 43 Java Sorting Reading: Sec. 9.3 Sorting Binary search is a huge speedup over sequential search But requires the list be sorted Slight Problem: How do we get a sorted list? Maintain the list in sorted

More information

CS159. Nathan Sprague

CS159. Nathan Sprague CS159 Nathan Sprague What s wrong with the following code? 1 /* ************************************************** 2 * Return the mean, or -1 if the array has length 0. 3 ***************************************************

More information

e-pg PATHSHALA- Computer Science Design and Analysis of Algorithms Module 14 Component-I (A) - Personal Details

e-pg PATHSHALA- Computer Science Design and Analysis of Algorithms Module 14 Component-I (A) - Personal Details e-pg PATHSHALA- Computer Science Design and Analysis of Algorithms Module 14 Component-I (A) - Personal Details Role Name Designation Principal Investigator Dr.T.V.Geetha Senior Professor, Department of

More information

HAS-A Relationship. If A uses B, then it is an aggregation, stating that B exists independently from A.

HAS-A Relationship. If A uses B, then it is an aggregation, stating that B exists independently from A. HAS-A Relationship Association is a weak relationship where all objects have their own lifetime and there is no ownership. For example, teacher student; doctor patient. If A uses B, then it is an aggregation,

More information

301AA - Advanced Programming [AP-2017]

301AA - Advanced Programming [AP-2017] 301AA - Advanced Programming [AP-2017] Lecturer: Andrea Corradini andrea@di.unipi.it Tutor: Lillo GalleBa galleba@di.unipi.it Department of Computer Science, Pisa Academic Year 2017/18 AP-2017-12: Polymorphisms

More information

CSE P 501 Compilers. Java Implementation JVMs, JITs &c Hal Perkins Winter /11/ Hal Perkins & UW CSE V-1

CSE P 501 Compilers. Java Implementation JVMs, JITs &c Hal Perkins Winter /11/ Hal Perkins & UW CSE V-1 CSE P 501 Compilers Java Implementation JVMs, JITs &c Hal Perkins Winter 2008 3/11/2008 2002-08 Hal Perkins & UW CSE V-1 Agenda Java virtual machine architecture.class files Class loading Execution engines

More information

Java is an objet-oriented programming language providing features that support

Java is an objet-oriented programming language providing features that support Java Essentials CSCI 136: Spring 2018 Handout 2 February 2 Language Basics Java is an objet-oriented programming language providing features that support Data abstraction Code reuse Modular development

More information

CS2 Algorithms and Data Structures Note 10. Depth-First Search and Topological Sorting

CS2 Algorithms and Data Structures Note 10. Depth-First Search and Topological Sorting CS2 Algorithms and Data Structures Note 10 Depth-First Search and Topological Sorting In this lecture, we will analyse the running time of DFS and discuss a few applications. 10.1 A recursive implementation

More information

Jedd: A BDD-based relational extension of Java

Jedd: A BDD-based relational extension of Java McGill University School of Computer Science Sable Research Group Jedd: A BDD-based relational extension of Java Sable Technical Report No. 2003-7 Ondřej Lhoták Laurie Hendren November 21, 2003 w w w.

More information

Refactoring Java Generics by Inferring Wildcards, In Practice

Refactoring Java Generics by Inferring Wildcards, In Practice Refactoring Java Generics by Inferring Wildcards, In Practice John Altidor & Yannis Smaragdakis Outline Background on variance Motivate adding Java wildcards to code Refactoring tool for adding Java wildcards

More information

Compiler construction

Compiler construction Compiler construction Martin Steffen March 13, 2017 Contents 1 Abstract 1 1.1 Symbol tables. 1 1.1.1 Introduction 1 1.1.2 Symbol table design and interface.. 2 1.1.3 Implementing symbol tables 3 1.1.4

More information

Estimating Mobile Application Energy Consumption Using Program Analysis

Estimating Mobile Application Energy Consumption Using Program Analysis Estimating Mobile Application Energy Consumption Using Program Analysis Shuai Hao, Ding Li, William G.J. Halfond, and Ramesh Govindan University of Southern California Motivation Smartphones are popular

More information

State-Space Search. Computer Science E-22 Harvard Extension School David G. Sullivan, Ph.D. Solving Problems by Searching

State-Space Search. Computer Science E-22 Harvard Extension School David G. Sullivan, Ph.D. Solving Problems by Searching State-Space Search Computer Science E- Harvard Extension School David G. Sullivan, Ph.D. Solving Problems by Searching A wide range of problems can be formulated as searches. more precisely, as the process

More information

NAME CHSM-Java Concurrent, Hierarchical, Finite State Machine specification language for Java

NAME CHSM-Java Concurrent, Hierarchical, Finite State Machine specification language for Java NAME CHSM-Java Concurrent, Hierarchical, Finite State Machine specification language for Java SYNOPSIS declarations description user-code DESCRIPTION The CHSM specification language is a text-based means

More information

Graphs. Part I: Basic algorithms. Laura Toma Algorithms (csci2200), Bowdoin College

Graphs. Part I: Basic algorithms. Laura Toma Algorithms (csci2200), Bowdoin College Laura Toma Algorithms (csci2200), Bowdoin College Undirected graphs Concepts: connectivity, connected components paths (undirected) cycles Basic problems, given undirected graph G: is G connected how many

More information

Java Class Loading and Bytecode Verification

Java Class Loading and Bytecode Verification Java Class Loading and Bytecode Verification Every object is a member of some class. The Class class: its members are the (definitions of) various classes that the JVM knows about. The classes can be dynamically

More information

Contents. Figures. Tables. Examples. Foreword. Preface. 1 Basics of Java Programming 1. xix. xxi. xxiii. xxvii. xxix

Contents. Figures. Tables. Examples. Foreword. Preface. 1 Basics of Java Programming 1. xix. xxi. xxiii. xxvii. xxix PGJC4_JSE8_OCA.book Page ix Monday, June 20, 2016 2:31 PM Contents Figures Tables Examples Foreword Preface xix xxi xxiii xxvii xxix 1 Basics of Java Programming 1 1.1 Introduction 2 1.2 Classes 2 Declaring

More information

Introduction to Visual Basic and Visual C++ Introduction to Java. JDK Editions. Overview. Lesson 13. Overview

Introduction to Visual Basic and Visual C++ Introduction to Java. JDK Editions. Overview. Lesson 13. Overview Introduction to Visual Basic and Visual C++ Introduction to Java Lesson 13 Overview I154-1-A A @ Peter Lo 2010 1 I154-1-A A @ Peter Lo 2010 2 Overview JDK Editions Before you can write and run the simple

More information

Introduction to Programming (Java) 4/12

Introduction to Programming (Java) 4/12 Introduction to Programming (Java) 4/12 Michal Krátký Department of Computer Science Technical University of Ostrava Introduction to Programming (Java) 2008/2009 c 2006 2008 Michal Krátký Introduction

More information

Data Structure. Recitation III

Data Structure. Recitation III Data Structure Recitation III Topic Binary Search Abstract Data types Java Interface Linked List Binary search Searching a sorted collection is a common task. A dictionary is a sorted list of word definitions.

More information

Lecture Overview Code generation in milestone 2 o Code generation for array indexing o Some rational implementation Over Express Over o Creating

Lecture Overview Code generation in milestone 2 o Code generation for array indexing o Some rational implementation Over Express Over o Creating 1 ecture Overview Code generation in milestone 2 o Code generation for array indexing o Some rational implementation Over Express Over o Creating records for arrays o Short-circuiting Or o If statement

More information

CS-140 Fall Binghamton University. Methods. Sect. 3.3, 8.2. There s a method in my madness.

CS-140 Fall Binghamton University. Methods. Sect. 3.3, 8.2. There s a method in my madness. Methods There s a method in my madness. Sect. 3.3, 8.2 1 Example Class: Car How Cars are Described Make Model Year Color Owner Location Mileage Actions that can be applied to cars Create a new car Transfer

More information

CSCI 3155: Principles of Programming Languages Exercise sheet #12 26 June 2007

CSCI 3155: Principles of Programming Languages Exercise sheet #12 26 June 2007 CSCI 3155: Principles of Programming Languages Exercise sheet #12 26 June 2007 Group name: Object-Oriented Programming I Exercise 1. The two most central aspects of object-oriented programming are dynamic

More information

CS558 Programming Languages Winter 2013 Lecture 8

CS558 Programming Languages Winter 2013 Lecture 8 OBJECT-ORIENTED PROGRAMMING CS558 Programming Languages Winter 2013 Lecture 8 Object-oriented programs are structured in terms of objects: collections of variables ( fields ) and functions ( methods ).

More information

More Relationships Between Classes

More Relationships Between Classes More Relationships Between Classes Inheritance: passing down states and behaviors from the parents to their children Interfaces: grouping the methods, which belongs to some classes, as an interface to

More information

Objects and Iterators

Objects and Iterators Objects and Iterators Can We Have Data Structures With Generic Types? What s in a Bag? All our implementations of collections so far allowed for one data type for the entire collection To accommodate a

More information