This artifact is based on ConstSanitizer, a dynamic program analysis tool that detects deep immutability violations through const qualifiers. Our tool instruments any code compiled by clang with the -fsanitizer=const flag. Our implementation includes both instrumentation of LLVM code and a runtime library to support our analysis. The provided package includes our tool and all experiments used in our companion paper. Instructions are also provided.
@Article{eyolfson_et_al:DARTS.2.1.3, author = {Eyolfson, Jon and Lam, Patrick}, title = {{C++ const and Immutability: An Empirical Study of Writes-Through-const (Artifact)}}, pages = {3:1--3:2}, journal = {Dagstuhl Artifacts Series}, ISSN = {2509-8195}, year = {2016}, volume = {2}, number = {1}, editor = {Eyolfson, Jon and Lam, Patrick}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DARTS.2.1.3}, URN = {urn:nbn:de:0030-drops-61249}, doi = {10.4230/DARTS.2.1.3}, annote = {Keywords: empirical study, dynamic analysis, immutability} }
0d30b05ad520209348fd38a3662e45f5
(Get MD5 Sum)
Feedback for Dagstuhl Publishing