-
1
-
-
4344569744
-
Risk analysis in software design
-
D. Verndon and G. McGraw. "Risk Analysis in Software Design," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 79-84.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 79-84
-
-
Verndon, D.1
McGraw, G.2
-
2
-
-
2342469291
-
Software security
-
G. McGraw, "Software Security," IEEE Security & Privacy, vol. 2, no. 2, 2004, pp. 80-83.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 80-83
-
-
McGraw, G.1
-
3
-
-
0030092390
-
Checking for race conditions in file accesses
-
M. Bishop and M. Dilger, "Checking for Race Conditions in File Accesses," Computing Systems, vol. 9, no. 2, 1996, pp. 131-152.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
4
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
(NDSS 00), Internet Soc.
-
D. Wagner et al., "A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities," Proc. 7th Network and Distributed System Security Symp. (NDSS 00), Internet Soc., 2000, pp. 3-17.
-
(2000)
Proc. 7th Network and Distributed System Security Symp
, pp. 3-17
-
-
Wagner, D.1
-
5
-
-
0036036247
-
Flow-sensitive type qualifiers
-
ACM Press
-
J. Foster, T. Terauchi, and A. Aiken, "Flow-Sensitive Type Qualifiers," Proc. ACM Conf. Programming Language Design and Implementation (PLDI 02), ACM Press, 2002, pp. 1-12.
-
(2002)
Proc. ACM Conf. Programming Language Design and Implementation (PLDI 02)
, pp. 1-12
-
-
Foster, J.1
Terauchi, T.2
Aiken, A.3
-
6
-
-
65349145047
-
Using programmer-written compiler extensions to catch security holes
-
IEEE CS Press
-
K. Ashcraft and D. Engler, "Using Programmer-Written Compiler Extensions to Catch Security Holes," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2002, pp. 131-147.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 131-147
-
-
Ashcraft, K.1
Engler, D.2
-
7
-
-
84905494891
-
Improving computer security using extended static checking
-
IEEE CS Press
-
B. Chess, "Improving Computer Security using Extended Static Checking," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2002, pp. 118-130.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 118-130
-
-
Chess, B.1
-
9
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
Usenix Assoc.
-
D. Larochelle and D. Evans, "Statically Detecting Likely Buffer Overflow Vulnerabilities," Proc. 10th Usenix Security Symp. (Usenix 01), Usenix Assoc., 2001, pp. 177-189.
-
(2001)
Proc. 10th Usenix Security Symp. (Usenix 01)
, pp. 177-189
-
-
Larochelle, D.1
Evans, D.2
-
10
-
-
0036040604
-
ESP: Path-sensitive program verification in polynomial time
-
ACM Press
-
M. Das, S. Lerner, and M. Seigle, "ESP: Path-Sensitive Program Verification in Polynomial Time," Proc. ACM Conf. Programming Language Design and Implementation (PLDI 02), ACM Press, 2002, pp. 57-68.
-
(2002)
Proc. ACM Conf. Programming Language Design and Implementation (PLDI 02)
, pp. 57-68
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
11
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
Springer-Verlag
-
T. Ball and S.K. Rajamani, "Automatically Validating Temporal Safety Properties of Interfaces," Proc. 8th Int'l SPIN Workshop on Model Checking of Software, LNCS 2057, Springer-Verlag, 2001, pp. 103-122.
-
(2001)
Proc. 8th Int'l SPIN Workshop on Model Checking of Software, LNCS 2057
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
13
-
-
79951744451
-
Finding bugs is easy
-
ACM Press
-
D. Hovemeyer and W. Pugh, "Finding Bugs is Easy," to appear in Companion of the 19th Ann. ACM Conf. Object-Oriented Programming, Systems, Languages, and Applications, ACM Press, 2004.
-
(2004)
Companion of the 19th Ann. ACM Conf. Object-Oriented Programming, Systems, Languages, and Applications
-
-
Hovemeyer, D.1
Pugh, W.2
|