{"batchcomplete":"","continue":{"lecontinue":"20260318035409|2485","continue":"-||"},"query":{"logevents":[{"logid":2495,"ns":0,"title":"Data Flow Analysis","pageid":2301,"logpage":2301,"revid":7093,"params":{},"type":"create","action":"create","user":"Ahn9807","timestamp":"2026-03-25T08:20:51Z","comment":"\uc0c8 \ubb38\uc11c: [[\ubd84\ub958:\ud504\ub85c\uadf8\ub7a8 \ubd84\uc11d]]  == \uac1c\uc694 == '''Data Flow Analysis'''\ub294 \ud504\ub85c\uadf8\ub7a8\uc758 \uac01 \uc9c0\uc810(program point)\uc5d0\uc11c \ubcc0\uc218\ub098 \uba54\ubaa8\ub9ac \uc0c1\ud0dc\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \uacc4\uc0b0\ud558\ub294 \uc815\uc801 \ubd84\uc11d \uae30\ubc95\uc774\ub2e4. \uc774 \ubd84\uc11d\uc740 \ud504\ub85c\uadf8\ub7a8\uc744 \uc2e4\ud589\ud558\uc9c0 \uc54a\uace0\ub3c4, \uac00\ub2a5\ud55c \ubaa8\ub4e0 \uc2e4\ud589 \uacbd\ub85c\ub97c \uace0\ub824\ud558\uc5ec \ubcc0\uc218\uc758 \uac12, \uc0c1\ud0dc, \ud639\uc740 \uc18d\uc131(property)\uc744 \ucd94\ub860\ud558\ub294 \uac83\uc744 \ubaa9\ud45c\ub85c \ud55c\ub2e4.  \ud2b9\ud788, Data Flow Analysis\ub294 \ud504\ub85c\uadf8\ub7a8\uc744 '''Control Flow Graph (CFG)'''\ub85c \ubcc0..."},{"logid":2494,"ns":6,"title":"\ud30c\uc77c:Data Flow Analysis Lattice.png","pageid":2300,"logpage":2300,"revid":7092,"params":{},"type":"create","action":"create","user":"Ahn9807","timestamp":"2026-03-25T05:59:43Z","comment":""},{"logid":2493,"ns":6,"title":"\ud30c\uc77c:Data Flow Analysis Lattice.png","pageid":2300,"logpage":2300,"revid":7092,"params":{"img_sha1":"sl9e03libfmifet3djn70j8h1aexgc3","img_timestamp":"2026-03-25T05:59:43Z"},"type":"upload","action":"upload","user":"Ahn9807","timestamp":"2026-03-25T05:59:43Z","comment":""},{"logid":2492,"ns":0,"title":"AddressSanitizer Optimization","pageid":2299,"logpage":2299,"revid":7091,"params":{},"type":"create","action":"create","user":"Ahn9807","timestamp":"2026-03-23T07:11:34Z","comment":"\uc0c8 \ubb38\uc11c: [[\ubd84\ub958:AddressSanitizer]] [[\ubd84\ub958:Program Analysis]] [[\ubd84\ub958:Optimization]]  == \uac1c\uc694 == \uc774 \ubb38\uc11c\ub294 AddressSanitizer(ASan)\uc758 \uc2e4\ud589 \uc624\ubc84\ud5e4\ub4dc\ub97c \uc904\uc774\uae30 \uc704\ud55c \ub2e4\uc591\ud55c \ucd5c\uc801\ud654 \uae30\ubc95\ub4e4\uc744 \uc815\ub9ac\ud55c \ubb38\uc11c\uc774\ub2e4.  ASan\uc740 heap, stack, global object\uc5d0 \ub300\ud55c out-of-bounds access\uc640 heap use-after-free\ub97c \ud6a8\uacfc\uc801\uc73c\ub85c \uac80\ucd9c\ud558\uc9c0\ub9cc, \uac01 memory access\ub9c8\ub2e4 shadow memory\ub97c \ud655\uc778\ud558\ub294 check\ub97c \uc0bd\uc785\ud558\ubbc0\ub85c \uc2e4\ud589 \uc2dc\uac04 \uc624\ubc84\ud5e4\ub4dc\uac00 \ud06c\ub2e4.   == Remo..."},{"logid":2491,"ns":0,"title":"Principles and Methodologies for Serial Performance Optimization","pageid":2298,"logpage":2298,"revid":7089,"params":{},"type":"create","action":"create","user":"Ahn9807","timestamp":"2026-03-19T02:22:23Z","comment":"\uc0c8 \ubb38\uc11c: [[\ubd84\ub958:USENIX OSDI]] {{Paper|title=Principles and Methodologies for Serial Performance Optimization|author=Sujin Park, Mingyu Guan, Xiang Cheng, Taesoo Kim Georgia Institute of Technology|year=2025|conference=USENIX OSDI 19}}  == \uac1c\uc694 == \uc774 \ub17c\ubb38\uc740 \uc2dc\uc2a4\ud15c \uc131\ub2a5 \ucd5c\uc801\ud654\uc5d0 \ucd08\uc810\uc744 \ub9de\ucd94\uace0, \uc774\ub97c \uccb4\uacc4\uc801\uc73c\ub85c \ucd5c\uc801\ud654\ud558\uae30 \uc704\ud55c framework\ub97c \uc81c\uc548\ud55c\ub2e4. \uae30\uc874\uc5d0\ub294 \uc131\ub2a5 \ucd5c\uc801\ud654\uac00 \uacbd\ud5d8\uacfc \uc9c1\uad00\uc5d0 \uc758\uc874\ud588\uc73c\ub098, \ubcf8 \ub17c\ubb38\uc740 \uc774\ub97c \uad6c\uc870\ud654\ub41c..."},{"logid":2490,"ns":6,"title":"\ud30c\uc77c:USENIX OSDI 2025 Sujin, Park Table 1.png","pageid":2297,"logpage":2297,"revid":7088,"params":{},"type":"create","action":"create","user":"Ahn9807","timestamp":"2026-03-18T12:03:04Z","comment":""},{"logid":2489,"ns":6,"title":"\ud30c\uc77c:USENIX OSDI 2025 Sujin, Park Table 1.png","pageid":2297,"logpage":2297,"revid":7088,"params":{"img_sha1":"rfdg9mh55zi1c7xbcbbtntatvva5nto","img_timestamp":"2026-03-18T12:03:04Z"},"type":"upload","action":"upload","user":"Ahn9807","timestamp":"2026-03-18T12:03:04Z","comment":""},{"logid":2488,"ns":0,"title":"Fast Pointer Nullification for Use-After-Free Prevention","pageid":2296,"logpage":2296,"revid":7086,"params":{},"type":"create","action":"create","user":"Ahn9807","timestamp":"2026-03-18T08:02:53Z","comment":"\uc0c8 \ubb38\uc11c: [[index.php?title=\ubd84\ub958:NDSS]]  {{Paper|title=Fast Pointer Nullification for Use-After-Free Prevention|author=Yubo Du University of Pittsburgh yubo.du@pitt.edu  Youtao Zhang University of Pittsburgh youtao@pitt.edu  Jun Yang University of Pittsburgh juy9@pitt.edu|conference=NDSS 2026|year=2026}}  == \uac1c\uc694 == [[Pointer nullification]]\uae30\ubc95\uc740 [[Use-after-free]]\ubc84\uadf8\ub97c \ud6a8\uacfc\uc801\uc73c\ub85c \ub9c9\uc744 \uc218 \uc788\uc9c0\ub9cc, \uae30\uc874\uc758 PN (Pointer nullification)\uae30\ubc95\ub4e4\uc740 \uba54\ud0c0\ub370\uc774\ud130 Looku..."},{"logid":2487,"ns":6,"title":"\ud30c\uc77c:NDSS 2026 FPN Figure 4.png","pageid":2295,"logpage":2295,"revid":7085,"params":{},"type":"create","action":"create","user":"Ahn9807","timestamp":"2026-03-18T04:56:12Z","comment":""},{"logid":2486,"ns":6,"title":"\ud30c\uc77c:NDSS 2026 FPN Figure 4.png","pageid":2295,"logpage":2295,"revid":7085,"params":{"img_sha1":"fjjsz0pelg639p3k1mlibhtfar6giu2","img_timestamp":"2026-03-18T04:56:12Z"},"type":"upload","action":"upload","user":"Ahn9807","timestamp":"2026-03-18T04:56:12Z","comment":""}]}}