-
1
-
-
35048840320
-
ZING: A model checker for concurrent software
-
LNCS 3114, Springer
-
T. Andrews, S. Qadeer, S.K. Rajamani, J. Rehof, and Y. Xie. ZING: A model checker for concurrent software. In Proc. CAV, LNCS 3114, pages 484-487. Springer, 2004.
-
(2004)
Proc. CAV
, pp. 484-487
-
-
Andrews, T.1
Qadeer, S.2
Rajamani, S.K.3
Rehof, J.4
Xie, Y.5
-
2
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
ACM
-
T.M. Austin, S.E. Breach, and G.S. Sohi. Efficient detection of all pointer and array access errors. In Proc. PLDI, pages 290-301. ACM, 1994.
-
(1994)
Proc. PLDI
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
3
-
-
0036039066
-
The SLAM project: Debugging system software via static analysis
-
ACM
-
T. Ball and S.K. Rajamani. The SLAM project: Debugging system software via static analysis. In Proc. POPL, pages 1-3. ACM, 2002.
-
(2002)
Proc. POPL
, pp. 1-3
-
-
Ball, T.1
Rajamani, S.K.2
-
4
-
-
0034448902
-
ABCD: Eliminating array bounds checks on demand
-
ACM
-
R. Bodik, R. Gupta, and V. Sarkar. ABCD: Eliminating array bounds checks on demand. In Proc. PLDI, pages 321-333. ACM, 2000.
-
(2000)
Proc. PLDI
, pp. 321-333
-
-
Bodik, R.1
Gupta, R.2
Sarkar, V.3
-
6
-
-
3042666526
-
Modular verification of software components in C
-
S. Chaki, E.M. Clarke, A. Groce, S. Jha, and H. Veith. Modular verification of software components in C. IEEE Trans. Software Engineering, 30:388-402, 2004.
-
(2004)
IEEE Trans. Software Engineering
, vol.30
, pp. 388-402
-
-
Chaki, S.1
Clarke, E.M.2
Groce, A.3
Jha, S.4
Veith, H.5
-
7
-
-
0038716438
-
CCURED in the real world
-
ACM
-
J. Condit, M. Harren, S. McPeak, G.C. Necula, and W. Weimer. CCURED in the real world. In Proc. PLDI, pages 232-244. ACM, 2003.
-
(2003)
Proc. PLDI
, pp. 232-244
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
8
-
-
0033697422
-
BANDERA: Extracting finite-state models from Java source code
-
ACM
-
J.C. Corbett, M.B. Dwyer, J. Hatcliff, C. Pasareanu, Robby, S. Laubach, and H. Zheng. BANDERA: Extracting finite-state models from Java source code. In Proc. ICSE, pages 439-448. ACM, 2000.
-
(2000)
Proc. ICSE
, pp. 439-448
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Pasareanu, C.4
Robby5
Laubach, S.6
Zheng, H.7
-
9
-
-
0001663802
-
Linear reasoning
-
W. Craig. Linear reasoning. J. Symbolic Logic, 22:250-268, 1957.
-
(1957)
J. Symbolic Logic
, vol.22
, pp. 250-268
-
-
Craig, W.1
-
10
-
-
0026243790
-
Efficiently computing static single-assignment form and the program dependence graph
-
R. Cytron, J. Ferrante, B.K. Rosen, M.N. Wegman, and F.K. Zadek. Efficiently computing static single-assignment form and the program dependence graph. ACM Trans. Programming Languages and Systems, 13:451-490, 1991.
-
(1991)
ACM Trans. Programming Languages and Systems
, vol.13
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadek, F.K.5
-
11
-
-
0030651806
-
Model checking for programming languages using VERISOFT
-
ACM
-
P. Godefroid. Model checking for programming languages using VERISOFT. In Proc. POPL, pages 174-186. ACM, 1997.
-
(1997)
Proc. POPL
, pp. 174-186
-
-
Godefroid, P.1
-
12
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proc. USENIX, pages 125-136, 1992.
-
(1992)
Proc. USENIX
, pp. 125-136
-
-
Hastings, R.1
Joyce, B.2
-
14
-
-
0027002125
-
Global tagging optimization by type inference
-
ACM
-
F. Henglein. Global tagging optimization by type inference. In Proc. LISP and Functional Programming, pages 205-215. ACM, 1992.
-
(1992)
Proc. LISP and Functional Programming
, pp. 205-215
-
-
Henglein, F.1
-
15
-
-
2442623463
-
Abstractions from proofs
-
ACM
-
T.A. Henzinger, R. Jhala, R. Majumdar, and K.L. McMillan. Abstractions from proofs. In Proc. POPL, pages 232-244. ACM, 2004.
-
(2004)
Proc. POPL
, pp. 232-244
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
McMillan, K.L.4
-
16
-
-
84937567800
-
Temporal-safety proofs for systems code
-
LNCS 2404. Springer
-
T.A. Henzinger, R. Jhala, R. Majumdar, G.C. Necula, G. Sutre, and W. Weimer. Temporal-safety proofs for systems code. In Proc. CAV, LNCS 2404, pages 526-538. Springer, 2002.
-
(2002)
Proc. CAV
, pp. 526-538
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Necula, G.C.4
Sutre, G.5
Weimer, W.6
-
17
-
-
34247149437
-
Extreme model checking
-
LNCS 2772. Springer
-
T.A. Henzinger, R. Jhala, R. Majumdar, and M.A.A. Sanvido. Extreme model checking. In International Symposium on Verification: Theory and Practice, LNCS 2772, pages 332-358. Springer, 2003.
-
(2003)
International Symposium on Verification: Theory and Practice
, pp. 332-358
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sanvido, M.A.A.4
-
18
-
-
0036041563
-
Lazy abstraction
-
ACM
-
T.A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Lazy abstraction. In Proc. POPL, pages 58-70. ACM, 2002.
-
(2002)
Proc. POPL
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
19
-
-
35248827669
-
Software verification with BLAST
-
LNCS 2648. Springer
-
T.A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Software verification with BLAST. In Proc. SPIN, LNCS 2648, pages 235-239. Springer, 2003.
-
(2003)
Proc. SPIN
, pp. 235-239
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
21
-
-
0005372144
-
SABER-C: An interpreter-based programming environment for the C language
-
S. Kaufer, R. Lopez, and S. Pratap. SABER-C: An interpreter-based programming environment for the C language. In Proc. USENIX, pages 161-171, 1988.
-
(1988)
Proc. USENIX
, pp. 161-171
-
-
Kaufer, S.1
Lopez, R.2
Pratap, S.3
-
22
-
-
11244321232
-
CMC: A pragmatic approach to model checking real code
-
USENIX
-
M. Musuvathi, D.Y.W. Park, A. Chou, D.R. Engler, and D.L. Dill. CMC: A pragmatic approach to model checking real code. In Proc. OSDI. USENIX, 2002.
-
(2002)
Proc. OSDI
-
-
Musuvathi, M.1
Park, D.Y.W.2
Chou, A.3
Engler, D.R.4
Dill, D.L.5
-
23
-
-
49249101269
-
Efficient representation and validation of proofs
-
IEEE
-
G.C. Necula and P. Lee. Efficient representation and validation of proofs. In Proc. LICS, pages 93-104. IEEE, 1998.
-
(1998)
Proc. LICS
, pp. 93-104
-
-
Necula, G.C.1
Lee, P.2
-
24
-
-
0036040304
-
CCURED: Type-safe retrofitting of legacy code
-
ACM
-
G.C. Necula, S. McPeak, and W. Weimer. CCURED: Type-safe retrofitting of legacy code. In Proc. POPL, pages 128-139. ACM, 2002.
-
(2002)
Proc. POPL
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
25
-
-
0029180939
-
Precise interprocedural dataflow analysis via graph reachability
-
ACM
-
T. Reps, S. Horwitz, and M. Sagiv. Precise interprocedural dataflow analysis via graph reachability. In Proc. POPL, pages 49-61. ACM, 1995.
-
(1995)
Proc. POPL
, pp. 49-61
-
-
Reps, T.1
Horwitz, S.2
Sagiv, M.3
-
26
-
-
35048868285
-
Implementation of an array bound checker
-
ACM
-
N. Suzuki and K. Ishihata. Implementation of an array bound checker. In Proc. POPL, pages 132-143. ACM, 1977.
-
(1977)
Proc. POPL
, pp. 132-143
-
-
Suzuki, N.1
Ishihata, K.2
|