-
3
-
-
35048871556
-
SLAM and static driver verifier: Technology transfer of formal methods inside Microsoft
-
Lecture Notes in Computer Science. Also appears at MSR-TE-2004-8
-
BALL, T., COOK, B., LEVIN, V., AND RAJAMANI, S. K. 2003. SLAM and static driver verifier: Technology transfer of formal methods inside Microsoft. In Integrated Formal Methods, Lecture Notes in Computer Science, vol. 2999.1-20. Also appears at MSR-TE-2004-8.
-
(2003)
Integrated Formal Methods
, vol.2999
, pp. 1-20
-
-
Ball, T.1
Cook, B.2
Levin, V.3
Rajamani, S.K.4
-
5
-
-
0030092390
-
Checking for race conditions in file accesses
-
BISHOP, M. AND DILGER, M. 1996. Checking for race conditions in file accesses. Computing Systems, 9, 2, 131-152.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
8
-
-
0038601527
-
Modular verification of software components in C
-
CHAKI, S., CLARKE, E., GROCE, A., JHA, S., AND VEITH, H. 2003. Modular verification of software components in C. In Proceedings of the 25th International Conference on Software Engineering (ICSE 2003). 385-395.
-
(2003)
Proceedings of the 25th International Conference on Software Engineering (ICSE 2003)
, pp. 385-395
-
-
Chaki, S.1
Clarke, E.2
Groce, A.3
Jha, S.4
Veith, H.5
-
9
-
-
33748164174
-
-
Tech. Rep. RC22254, IBM Research
-
EDWARDS, A., JAEGER, T., AND ZHANG, X. 2001. Runtime verification of Authorization Hook Placement for the Linux Security Modules Framework. Tech. Rep. RC22254, IBM Research.
-
(2001)
Runtime Verification of Authorization Hook Placement for the Linux Security Modules Framework
-
-
Edwards, A.1
Jaeger, T.2
Zhang, X.3
-
10
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
ENGLER, D., CHELF, B., CHOU, A., AND HALLEM, S. 2000. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of the Fourth Symposium on Operation System Design and Implementation (OSDI).
-
(2000)
Proceedings of the Fourth Symposium on Operation System Design and Implementation (OSDI)
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
11
-
-
0036039794
-
A system and language for building system-specific, static analyses (appeared in PLDI 2002)
-
HALLEM, S., CHELF, B., XIE, Y., AND ENGLER, D. 2002. A system and language for building system-specific, static analyses (appeared in PLDI 2002). In ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '02).
-
(2002)
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '02)
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
13
-
-
3142582577
-
Buffer overrun detection using linear programming and static analysis
-
GANAPATHY, V., JHA, S., CHANDLER, D., MELSKI, D., AND VITEK, D. 2003. Buffer overrun detection using linear programming and static analysis. In Proceedings of the 10th ACM Conference on Computer and Communications Security.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Ganapathy, V.1
Jha, S.2
Chandler, D.3
Melski, D.4
Vitek, D.5
-
19
-
-
0038108908
-
Access rights analysis for Java
-
KOVED, L., PISTOLA, M., AND KERSCHENBAUM, A. 2002. Access rights analysis for Java. In Proceedings of 17th Annual ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA).
-
(2002)
Proceedings of 17th Annual ACM Conference on Object-oriented Programming Systems, Languages, and Applications (OOPSLA)
-
-
Koved, L.1
Pistola, M.2
Kerschenbaum, A.3
-
21
-
-
0038289816
-
-
National Computer Security Center. DoD 5200.28-STD, also known as the Orange Book
-
NCSC. 1985. Trusted Computer Security Evaluation Criteria. National Computer Security Center. DoD 5200.28-STD, also known as the Orange Book.
-
(1985)
Trusted Computer Security Evaluation Criteria
-
-
-
22
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
SHANKAR, U., TALWAR, K., FOSTER, J. S., AND WAGNER, D. 2001. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the Tenth USENIX Security Symposium. 201-216.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 201-216
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
23
-
-
84949505015
-
ITS4: A static vulnerability scanner for C and C++ code
-
VIEGA, J., BLOCH, J., KOHNO, Y., AND MCGRAW, G. 2000. ITS4: A static vulnerability scanner for C and C++ code. In Proceedings of 2000 Annual Security Applications Conference.
-
(2000)
Proceedings of 2000 Annual Security Applications Conference
-
-
Viega, J.1
Bloch, J.2
Kohno, Y.3
McGraw, G.4
-
24
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
WAGNER, D., FOSTER, J. S., BREWER, E. A., AND AIKEN, A. 2000. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of Network and Distributed System Security Symposium (NDSS 2000).
-
(2000)
Proceedings of Network and Distributed System Security Symposium (NDSS 2000)
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
26
-
-
3142581514
-
-
Internal draft document to become an IBM technical report
-
ZHANG, X., MARCEAU, G., JAEGER, T., AND KOVED, L. Translation of C programs for static analysis by the JaBA framework. Internal draft document to become an IBM technical report.
-
Translation of C Programs for Static Analysis by the JaBA Framework
-
-
Zhang, X.1
Marceau, G.2
Jaeger, T.3
Koved, L.4
|