-
1
-
-
14744271696
-
Software penetration testing
-
B. Arkin, S. Slender, and G. McGraw. Software penetration testing. Proceedings of the IEEE Symposium on Security and Privacy, 3(1):84-87, 2005.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, vol.3
, Issue.1
, pp. 84-87
-
-
Arkin, B.1
Slender, S.2
McGraw, G.3
-
3
-
-
0040026563
-
A generalization of the differential approach to recursive query optimization
-
Sept.
-
I. Balbin and K. Ramamohanarao. A generalization of the differential approach to recursive query optimization. Journal of Logic Programming, 4(3):259-262, Sept. 1987.
-
(1987)
Journal of Logic Programming
, vol.4
, Issue.3
, pp. 259-262
-
-
Balbin, I.1
Ramamohanarao, K.2
-
4
-
-
0038489696
-
SLIC: A specification language for interface checking (of C)
-
Microsoft Research, Jan.
-
T. Ball and S. Rajamani. SLIC: A specification language for interface checking (of C). Technical Report MSR-TR-2001-21, Microsoft Research, Jan. 2002.
-
(2002)
Technical Report
, vol.MSR-TR-2001-21
-
-
Ball, T.1
Rajamani, S.2
-
6
-
-
85027186168
-
Magic sets and other strange ways to implement logic programs (extended abstract)
-
F. Bancilhon, D. Maier, Y. Sagiv, and J. D. Ullman. Magic sets and other strange ways to implement logic programs (extended abstract). In PODS '86: Proceedings of the Fifth ACM SICACT-SIGMOD Symposium on Principles of Database Systems, pages 1-15, 1986.
-
(1986)
PODS '86: Proceedings of the Fifth ACM SICACT-SIGMOD Symposium on Principles of Database Systems
, pp. 1-15
-
-
Bancilhon, F.1
Maier, D.2
Sagiv, Y.3
Ullman, J.D.4
-
7
-
-
0038716510
-
Points-to analysis using BDDs
-
June
-
M. Berndl, O. Lhoták, F. Qian, L. Hendren, and N. Umanee. Points-to analysis using BDDs. In Proceedings of the SIGPLAN Conference on Programming Language Design and Implementation, pages 103-114, June 2003.
-
(2003)
Proceedings of the SIGPLAN Conference on Programming Language Design and Implementation
, pp. 103-114
-
-
Berndl, M.1
Lhoták, O.2
Qian, F.3
Hendren, L.4
Umanee, N.5
-
10
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput., 35(8):677-691, 1986.
-
(1986)
IEEE Trans. Comput.
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
15
-
-
0029695436
-
Tabled evaluation with delaying for general logic programs
-
W. Chen and D. S. Warren. Tabled evaluation with delaying for general logic programs. J. ACM, 43(1):20-74, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.1
, pp. 20-74
-
-
Chen, W.1
Warren, D.S.2
-
19
-
-
85029529333
-
Efficient bottom-up abstract interpretation of prolog by means of constraint solving over symbolic finite domains
-
M.-M. Corsini, K. Musumbu, A. Rauzy, and B. L. Charlier. Efficient bottom-up abstract interpretation of prolog by means of constraint solving over symbolic finite domains. In PLILP '93: Proceedings of the 5th International Symposium on Programming Language Implementation and Logic Programming, pages 75-91, 1993.
-
(1993)
PLILP '93: Proceedings of the 5th International Symposium on Programming Language Implementation and Logic Programming
, pp. 75-91
-
-
Corsini, M.-M.1
Musumbu, K.2
Rauzy, A.3
Charlier, B.L.4
-
20
-
-
84890014643
-
Estimating the impact of scalable pointer analysis on optimization
-
July
-
M. Das, B. Liblit, M. Fähndrich, and J. Rehof. Estimating the impact of scalable pointer analysis on optimization. In Proceedings of the 8th International Static Analysis Symposium, pages 260-278, July 2001.
-
(2001)
Proceedings of the 8th International Static Analysis Symposium
, pp. 260-278
-
-
Das, M.1
Liblit, B.2
Fähndrich, M.3
Rehof, J.4
-
23
-
-
0036680338
-
Learning cost-sensitive active classifiers
-
R. Greiner, A. J. Grove, and D. Roth. Learning cost-sensitive active classifiers. Artif. Intell., 139(2): 137-174, 2002.
-
(2002)
Artif. Intell.
, vol.139
, Issue.2
, pp. 137-174
-
-
Greiner, R.1
Grove, A.J.2
Roth, D.3
-
26
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, pages 69-82, 2002.
-
(2002)
Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation
, pp. 69-82
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
31
-
-
84858536299
-
Divide and conquer: HTTP response splitting
-
A. Klein. Divide and conquer: HTTP response splitting, Web cache poisoning attacks, and related topics. http://www.sanctuminc.com/pdf/Whitepaper_ HTTPResponse. pdf, 2004.
-
(2004)
Web Cache Poisoning Attacks, and Related Topics
-
-
Klein, A.1
-
36
-
-
84958761896
-
Compactly representing first-order structures for static analysis
-
Sept.
-
R. Manevich, G. Ramalingam, J. Field, D. Goyal, and M. Sagiv. Compactly representing first-order structures for static analysis. In Proceedings of the 9th International Static Analysis Symposium, pages 196-212, Sept. 2002.
-
(2002)
Proceedings of the 9th International Static Analysis Symposium
, pp. 196-212
-
-
Manevich, R.1
Ramalingam, G.2
Field, J.3
Goyal, D.4
Sagiv, M.5
-
40
-
-
0027621819
-
Implementation of the CORAL deductive database system
-
May
-
R. Ramakrishnan, D. Srivastava, S. Sudarshan, and P. Seshadri. Implementation of the CORAL deductive database system. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pages 167-176, May 1993.
-
(1993)
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data
, pp. 167-176
-
-
Ramakrishnan, R.1
Srivastava, D.2
Sudarshan, S.3
Seshadri, P.4
-
41
-
-
0003638217
-
Demand interprocedural program analysis using logic databases
-
T. Reps. Demand interprocedural program analysis using logic databases. Applications of Logic Databases, pages 163-196, 1994.
-
(1994)
Applications of Logic Databases
, pp. 163-196
-
-
Reps, T.1
-
45
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the 2001 Usenix Security Conference, pages 201-220, 2001.
-
(2001)
Proceedings of the 2001 Usenix Security Conference
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
46
-
-
0002823436
-
Two approaches to interprocedural data-flow analyis
-
S. Muchnick and N. D. Jones, editors, chapter 7, Prentice-Hall
-
M. Sharir and A. Pnueli. Two approaches to interprocedural data-flow analyis. In S. Muchnick and N. D. Jones, editors, Program Flow Analysis: Theory and Applications, chapter 7, pages 189-234. Prentice-Hall, 1981.
-
(1981)
Program Flow Analysis: Theory and Applications
, pp. 189-234
-
-
Sharir, M.1
Pnueli, A.2
-
52
-
-
84858537297
-
Top five threats
-
Apr.
-
M. Vernon. Top five threats. ComputerWeekly.com (http://www. computerweekly.com/Article129980.htm), Apr. 2004.
-
(2004)
ComputerWeekly.com
-
-
Vernon, M.1
-
53
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of Network and Distributed Systems Security Symposium, pages 3-17, 2000.
-
(2000)
Proceedings of Network and Distributed Systems Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
|