-
1
-
-
0030260329
-
Fast Static Analysis of C++ Virtual Function Calls
-
Proc. of OOPSLA '96, New York. ACM Press
-
D. F. Bacon and P. F. Sweeney. Fast Static Analysis of C++ Virtual Function Calls. In Proc. of OOPSLA '96, volume 31(10) of ACM SIGPLAN Notices, pages 324-341, New York, 1996. ACM Press.
-
(1996)
ACM SIGPLAN Notices
, vol.31
, Issue.10
, pp. 324-341
-
-
Bacon, D.F.1
Sweeney, P.F.2
-
4
-
-
0034963556
-
Model ckecking security properties of control flow graphs
-
F. Besson, T. Jensen, D. Le Métayer, and T. Thorn. Model ckecking security properties of control flow graphs. Journal of Computer Security, 9:217-250, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, pp. 217-250
-
-
Besson, F.1
Jensen, T.2
Le Métayer, D.3
Thorn, T.4
-
6
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximations of fixpoints
-
Los Angeles, CA. ACM Press, New York
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximations of fixpoints. In Proc. of 4th ACM Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, CA, 1977. ACM Press, New York.
-
(1977)
Proc. of 4th ACM Symposium on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
7
-
-
84878892024
-
Automatic synthesis of optimal invariant assertions: Mathematical foundations
-
Rochester, NY
-
P. Cousot and R. Cousot. Automatic synthesis of optimal invariant assertions: Mathematical foundations. In Proc. of the ACM Symposium on Artificial Intelligence and Programming Languages, SIGPLAN Notices, (8), pages 1-12, Rochester, NY, 1977.
-
(1977)
Proc. of the ACM Symposium on Artificial Intelligence and Programming Languages, SIGPLAN Notices
, Issue.8
, pp. 1-12
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
0001449325
-
Temporal and modal logic
-
J. van Leeuwen, editor, Amsterdam. Elsevier Science Publishers
-
E. A. Emerson. Temporal and Modal Logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, pages 996-1072, Amsterdam, 1990. Elsevier Science Publishers.
-
(1990)
Handbook of Theoretical Computer Science
, vol.B
, pp. 996-1072
-
-
Emerson, E.A.1
-
12
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
Dec.
-
L. Gong. Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2. In Proc. of USENIX Symposium on Internet Technologies and Systems, Dec. 1997.
-
(1997)
Proc. of USENIX Symposium on Internet Technologies and Systems
-
-
Gong, L.1
-
13
-
-
0031245885
-
Call graph construction in object-oriented languages
-
D. Grove, G. Furrow, J. Dean, and C. Chambers. Call graph construction in object-oriented languages. In Proc. of Object-Oriented Programming Systems, Languages and Applications (OOPSLA'97), 1997.
-
(1997)
Proc. of Object-Oriented Programming Systems, Languages and Applications (OOPSLA'97)
-
-
Grove, D.1
Furrow, G.2
Dean, J.3
Chambers, C.4
-
19
-
-
84945270736
-
A systematic approach to static access control
-
D. Sands, editor. Springer LNCS
-
F. Pottier, C. Skalka, and S. Smith. A systematic approach to static access control. In D. Sands, editor, Proc. of the 10th European Symposium on Programming (ESOP'01), pages 30-45. Springer LNCS vol. 2028, 2001.
-
(2001)
Proc. of the 10th European Symposium on Programming (ESOP'01)
, vol.2028
, pp. 30-45
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
20
-
-
84881225236
-
Enforceable security policies
-
Preliminary version appeared as Cornell Univ. Tech. Rep. TR 98-1664,1998
-
F. Schneider. Enforceable security policies. ACM Trans. on Information and System Security, 3(1):30-50, 2000. Preliminary version appeared as Cornell Univ. Tech. Rep. TR 98-1664,1998.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
22
-
-
84947731286
-
An automata-theoretic approach to linear temporal logic
-
Springer-Verlag Inc., New York, NY, USA
-
M. Y. Vardi. An Automata-Theoretic Approach to Linear Temporal Logic, volume 1043 of Lecture Notes in Computer Science, pages 238-266. Springer-Verlag Inc., New York, NY, USA, 1996.
-
(1996)
Lecture Notes in Computer Science
, pp. 238-266
-
-
Vardi, M.Y.1
-
23
-
-
0003396725
-
-
PhD thesis, Dept. of Computer Science, Princeton University, Jan.
-
D. S. Wallach. A new approach to mobile code security. PhD thesis, Dept. of Computer Science, Princeton University, Jan. 1999.
-
(1999)
A New Approach to Mobile Code Security
-
-
Wallach, D.S.1
|