-
1
-
-
0004072686
-
-
Addison-Wesley
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1988.
-
(1988)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
2
-
-
31744445215
-
Adding trace matching with free variables to aspectJ
-
C. Allan, P. Augustinov, A. S. Christensen, L. Hendren, S. Kuzins, O. Lhotak, O. de Moor, D. Sereni, G. Sittampalam, and J. Tibbie. Adding Trace Matching with Free Variables to AspectJ. In OOPSLA '05: Proceedings of the 20th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2005.
-
(2005)
OOPSLA '05: Proceedings of the 20th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications
-
-
Allan, C.1
Augustinov, P.2
Christensen, A.S.3
Hendren, L.4
Kuzins, S.5
Lhotak, O.6
De Moor, O.7
Sereni, D.8
Sittampalam, G.9
Tibbie, J.10
-
3
-
-
17044362578
-
Synthesis of interface specifications for Java classes
-
R. Alur, P. Černý, P. Madhusudan, and W. Nam. Synthesis of Interface Specifications for Java Classes. In POPL '05: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 98-109, 2005.
-
(2005)
POPL '05: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 98-109
-
-
Alur, R.1
Černý, P.2
Madhusudan, P.3
Nam, W.4
-
8
-
-
0038489696
-
SLIC: A Specification Language for Interface Checking (of C)
-
Microsoft Research, January
-
T. Ball and S. Rajamani. SLIC: A Specification Language for Interface Checking (of C). Technical Report MSR-TR-2001-21, Microsoft Research, January 2002.
-
(2002)
Technical Report
, vol.MSR-TR-2001-21
-
-
Ball, T.1
Rajamani, S.2
-
11
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
J. C. Corbett, M. B. Dwyer, J. Hatcliff, S. Laubach, C. S. Pǎsǎreanu, Robby, and H. Zheng. Bandera: Extracting Finite-State Models from Java Source Code. In ICSE '00: Proceedings of the 22nd International Conference on Software Engineering, pages 439-448, 2000.
-
(2000)
ICSE '00: Proceedings of the 22nd International Conference on Software Engineering
, pp. 439-448
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Laubach, S.4
Pǎsǎreanu, C.S.5
Robby6
Zheng, H.7
-
14
-
-
1942425806
-
Vulnerability testing of software system using fault injection
-
COAST, Purdue University, West Lafayette, IN, US, April
-
W. Du and A. P. Mathur. Vulnerability Testing of Software System Using Fault Injection. Technical report, COAST, Purdue University, West Lafayette, IN, US, April 1998.
-
(1998)
Technical Report
-
-
Du, W.1
Mathur, A.P.2
-
15
-
-
0034590639
-
Testing for software vulnerability using environment perturbation
-
New York City, NY, June
-
W. Du and A. P. Mathur. Testing for Software Vulnerability Using Environment Perturbation. In Proceedings of the International Conference on Dependable Systems and Networks (DSN 2000), Workshop On Dependability Versus Malicious Faults, pages 603-612, New York City, NY, June 2000.
-
(2000)
Proceedings of the International Conference on Dependable Systems and Networks (DSN 2000), Workshop on Dependability Versus Malicious Faults
, pp. 603-612
-
-
Du, W.1
Mathur, A.P.2
-
16
-
-
0033698745
-
Quickly detecting relevant program invariants
-
Limerick, Ireland, June 7-9
-
M. D. Ernst, A. Czeisler, W. G. Griswold, and D. Notkin. Quickly Detecting Relevant Program Invariants. In ICSE 2000, Proceedings of the 22nd International. Conference on Software Engineering, pages 449-458, Limerick, Ireland, June 7-9, 2000.
-
(2000)
ICSE 2000, Proceedings of the 22nd International. Conference on Software Engineering
, pp. 449-458
-
-
Ernst, M.D.1
Czeisler, A.2
Griswold, W.G.3
Notkin, D.4
-
17
-
-
31744449292
-
Relational queries over program traces
-
S. Goldsmith, R. O'Callahan, and A. Aiken. Relational Queries Over Program Traces. In Proceedings of the ACM SIGPLAN 2005 Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 2005.
-
(2005)
Proceedings of the ACM SIGPLAN 2005 Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA)
-
-
Goldsmith, S.1
O'Callahan, R.2
Aiken, A.3
-
18
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
S. Hallem, B. Chelf, Y. Xie, and D. Engler. A System and Language for Building System-Specific, Static Analyses. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI), pages 69-82, 2002.
-
(2002)
Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation (PLDI)
, pp. 69-82
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
21
-
-
18944390941
-
The model checker SPIN
-
G. J. Holzmann. The Model Checker SPIN. Software Engineering, 23(5):279-295, 1997.
-
(1997)
Software Engineering
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
23
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y Kuo. Securing Web Application Code by Static Analysis and Runtime Protection. In Proceedings of the 13th Conference on the World Wide Web, pages 40-52, 2004.
-
(2004)
Proceedings of the 13th Conference on the World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
25
-
-
82955230066
-
An overview of aspectJ
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. Lecture Notes in Computer Science, 2072:327-355, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2072
, pp. 327-355
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
28
-
-
35248854618
-
A type system and analysis for the automatic extraction and enforcement of design information
-
Darmstadt, Germany, July
-
P. Lam and M. Rinard. A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information. In Proceedings of the 17th European Conference on Object-Oriented Programming, pages 275-302, Darmstadt, Germany, July 2003.
-
(2003)
Proceedings of the 17th European Conference on Object-oriented Programming
, pp. 275-302
-
-
Lam, P.1
Rinard, M.2
-
29
-
-
0031249077
-
Query-based debugging of object-oriented programs
-
New York, NY, USA. ACM Press
-
R. Lencevicius, U. Hölzle, and A. K. Singh. Query-Based Debugging of Object-Oriented Programs. In OOPSLA '97: Proceedings of the 12th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 304-317, New York, NY, USA, 1997. ACM Press.
-
(1997)
OOPSLA '97: Proceedings of the 12th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications
, pp. 304-317
-
-
Lencevicius, R.1
Hölzle, U.2
Singh, A.K.3
-
30
-
-
17044373071
-
Automated soundness proofs for dataflow analyses and transformations via local rules
-
S. Lerner, T. Millstein, E. Rice, and C. Chambers. Automated Soundness Proofs for Dataflow Analyses and Transformations Via Local Rules. In POPL '05: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 364-377, 2005.
-
(2005)
POPL '05: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 364-377
-
-
Lerner, S.1
Millstein, T.2
Rice, E.3
Chambers, C.4
-
31
-
-
8344244537
-
Parametric regular path queries
-
Y. A. Liu, T. Rothamel, F. Yu, S. D. Stoller, and N. Hu. Parametric Regular Path Queries. In Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation (PLDI), pages 219-230, 2004.
-
(2004)
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation (PLDI)
, pp. 219-230
-
-
Liu, Y.A.1
Rothamel, T.2
Yu, F.3
Stoller, S.D.4
Hu, N.5
-
35
-
-
84858903390
-
F.-M. S. mailing list
-
F.-M. S. mailing list. Vulnerability Scanner for SQL injection. http://www.derkeiler.com/Mailing-Lists/securityfocus/focus-ms/2003-09/0110.html, 2003.
-
(2003)
Vulnerability Scanner for SQL Injection
-
-
-
39
-
-
16244366310
-
Valgrind: A program supervision framework
-
O. Sokolsky and M. Viswanathan, editors. Elsevier
-
N. Nethercote and J. Seward. Valgrind: A Program Supervision Framework. In O. Sokolsky and M. Viswanathan, editors, Electronic Notes in Theoretical Computer Science, volume 89. Elsevier, 2003.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.89
-
-
Nethercote, N.1
Seward, J.2
-
40
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically Hardening Web Applications Using Precise Tainting. In Proceedings of the 20th IFIP International Information Security Conference, 2005.
-
(2005)
Proceedings of the 20th IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
42
-
-
0026112905
-
A dataflow approach to event-based debugging
-
R. A. Olsson, R. H. Cawford, and W. W. Ho. A Dataflow Approach to Event-Based Debugging. Software - Practice and Experience, 21(2):209-230, 1991.
-
(1991)
Software - Practice and Experience
, vol.21
, Issue.2
, pp. 209-230
-
-
Olsson, R.A.1
Cawford, R.H.2
Ho, W.W.3
-
45
-
-
23744480722
-
SABER: Smart analysis based error reduction
-
D. Reimer, E. Schonberg, K. Srinivas, H. Srinivasan, B. Alpern, R. D. Johnson, A. Kershenbaum, and L. Koved. SABER: Smart Analysis Based Error Reduction. In Proceedings of International Symposium on Software Testing and Analysis, 2004.
-
(2004)
Proceedings of International Symposium on Software Testing and Analysis
-
-
Reimer, D.1
Schonberg, E.2
Srinivas, K.3
Srinivasan, H.4
Alpern, B.5
Johnson, R.D.6
Kershenbaum, A.7
Koved, L.8
-
46
-
-
0031272525
-
Eraser: A dynamic data race detector for multithreaded programs
-
S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson. Eraser: A Dynamic Data Race Detector for Multithreaded Programs. ACM Trans. Comput. Syst., 15(4):391-411, 1997.
-
(1997)
ACM Trans. Comput. Syst.
, vol.15
, Issue.4
, pp. 391-411
-
-
Savage, S.1
Burrows, M.2
Nelson, G.3
Sobalvarro, P.4
Anderson, T.5
-
49
-
-
84858905616
-
-
http://patterns.projects.cis.ksu.edu/.
-
-
-
-
51
-
-
14544288942
-
-
Manning Publications Co.
-
B. A. Tate. Bitter Java. Manning Publications Co., 2002.
-
(2002)
Bitter Java
-
-
Tate, B.A.1
-
52
-
-
31744434131
-
-
April
-
M. Vernon. Top Five Threats. ComputerWeekly.com (http://www. computerweekly.com/Article129980.htm), April 2004.
-
(2004)
Top Five Threats
-
-
Vernon, M.1
-
54
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. In Proceedings of Network and Distributed Systems Security Symposium, pages 3-17, 2000.
-
(2000)
Proceedings of Network and Distributed Systems Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
55
-
-
20344372701
-
Implementing protocols via declarative event patterns
-
New York, NY, USA. ACM Press
-
R. J. Walker and K. Viggers. Implementing Protocols Via Declarative Event Patterns. In SIGSOFT '04/FSE-12: Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 159-169, New York, NY, USA, 2004. ACM Press.
-
(2004)
SIGSOFT '04/FSE-12: Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 159-169
-
-
Walker, R.J.1
Viggers, K.2
-
56
-
-
84858896305
-
-
Web Application Security Consortium. Threat Classification. http://www.webappsec.org/tc/WASC-TC-v1_0.pdf, 2004.
-
(2004)
Threat Classification
-
-
|