[racket] Static Analysis Source Code

2014-05-29 Thread Mansour Alqattan
Dear Basically I am working on untyped language which considered as an intermediate language and it is (Wide Spectrum Language) Can we use *static program analysis* tool (include transformation techniques such as slicing) of untyped programming intermediate language to identify the vulnerabili

[racket] static analysis for finding vulnerabilities on non-executable and untyped language

2014-06-04 Thread Mansour Alqattan
Hello i am working on untyped intermediate programming language and this language is not meant to be for executing so it is non-executable. and it has already AST (Abstract Syntax Tree). I want only to find a method for doing static analysis on the coding to find the potential vulnerabilities i

[racket] Specification Language

2014-06-07 Thread Mansour Alqattan
Hello The untyped intermediate language that I am working on is kind of specification language and it is provide the AST and procedure/function graphics and also provide transformation techniques for simplifying the code but I am trying to find a pattern or technique that can formalise the potenti

[racket] Convert ASTs to Control Flow Graphic

2014-06-13 Thread Mansour Alqattan
Is it possible to convert any ASTs to control flow graphic (CFG) or (DFG) automaticlly ? If yes how? Is there any software does that Thanks Racket Users list: http://lists.racket-lang.org/users

[racket] Static Analysis and Graphics

2014-06-16 Thread Mansour Alqattan
Dear What do we use the following graphics for ?? such as Program Dependence Graph (PDG) and (CFG) Control Flow Graph and System Dependence Graph (SDG) and Data Flow Graphic (DFG) and Abstract Syntax Trees (ASTs) and Path Analysis. - How do I use these graphics for semantic or syntax?. is there p

[racket] Assembly X86 Self Contained Code

2014-08-20 Thread Mansour Alqattan
Hello, Is there a software can fix the bugs and security vulnerabilities on assembly X86 ?? if yes, what kind of assembly can fix? is it libc-functions code or fully self contained same as the attachment file "fakt.asm code". I have heard that if we want to get a self contained code, we need to

[racket] Transformation Rules

2014-11-16 Thread Mansour Alqattan
Dear is there way to define a set of transformations which can be applied to the program before testing for vulnerabilities (also: can the test for the vulnerability be more sophisticated than a simple pattern match. For example, using data low analysis). I would like to apply a set of transforma

[racket] mansour alqattan invited you to check out Dropbox

2014-11-02 Thread mansour alqattan via Dropbox
Hi there, mansour alqattan wants you to try Dropbox! Dropbox lets you bring all your photos, docs and videos with you anywhere and share them easily. Get started here. https://www.dropbox.com/l/a4Hpf5gMaDBtwqFWz4bxUs?text=1 Thanks! - The Dropbox Team