StackAnalyzer user interface

StackAnalyzer screenshot

StackAnalyzer can be combined with other static program analyzers from AbsInt in a single intuitive user interface.


StackAnalyzer screenshot

Configuration screen: selecting files for analysis. StackAnalyzer directly analyzes binary executables, exactly as they are executed in the final system.


StackAnalyzer screenshot

Analysis results: the worst-case stack usage is shown in bytes. The results are valid for all inputs and each task execution. StackAnalyzer automatically considers all possible execution scenarios.

Double-clicking on the analysis results opens the call graph of the analyzed application.


StackAnalyzer screenshot

Call graph with stack usage analysis results. All routines are annotated by their worst-case stack usage. The worst-case path is high­lighted. Dead code and infeasible paths are grayed out.

Each routine can be interactively unfolded to further inspect the control flow within it.


StackAnalyzer screenshot

In the control flow graph, all basic blocks are annotated by their worst-case stack usage, and can be further unfolded to inspect the stack usage of each individual instruction within. StackAnalyzer lets you investigate your application’s behavior at any desired level of detail.


StackAnalyzer screenshot

In addition to the detailed graphs, tabular and chart overviews of the analysis results are available.

Customizable XML reports for integration, documentation, and certification purposes can be automatically generated from the GUI as well as from the command line.


StackAnalyzer screenshot

Various other views provide an even deeper insight into the workings of your software. For example, the Sections view allows you to view all sections of the binary and inspect their content like in a hex editor. It also enables you to find out the memory content for a given address area.


StackAnalyzer screenshot

An optional ValueAnalyzer add-on lets you inspect the contents of all registers and memory cells at any program point in any execution context.