-
6
-
-
0033729897
-
The real-time specification for Java
-
G. Bollella and J. Gosling. The real-time specification for Java. IEEE Computer, 33(6):47-54, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.6
, pp. 47-54
-
-
Bollella, G.1
Gosling, J.2
-
10
-
-
0036040604
-
Esp: Path-sensitive program verification in polynomial time
-
Berlin, Germany, Jun
-
M. Das, S. Lerner, and M. Siegle. Esp: Path-sensitive program verification in polynomial time. In Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), Berlin, Germany, Jun 2002.
-
(2002)
Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)
-
-
Das, M.1
Lerner, S.2
Siegle, M.3
-
13
-
-
84858903147
-
Enforcing alias analysis for weakly typed languages
-
Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Oct
-
D. Dhurjati, S. Kowshik, and V. Adve. Enforcing alias analysis for weakly typed languages. Tech Report UIUCDCS-R-2005-2657, Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Oct 2005. See http://safecode.ca.uiuc.edu/.
-
(2005)
Tech Report
, vol.UIUCDCS-R-2005-2657
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
-
14
-
-
0242612097
-
Memory safety without runtime checks or garbage collection
-
Jun
-
D. Dhurjati, S. Kowshik, V. Adve, and C. Lattner. Memory safety without runtime checks or garbage collection. In Conf. on Language, Compiler, and Tool Support for Embedded Systems (LCTES), Jun 2003.
-
(2003)
Conf. on Language, Compiler, and Tool Support for Embedded Systems (LCTES)
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
Lattner, C.4
-
18
-
-
3142582577
-
Buffer overrun detection using linear programming and static analysis
-
New York, NY, USA
-
V. Ganapathy, S. Jha, D. Chandler, D. Melski, and D. Vitek. Buffer overrun detection using linear programming and static analysis. In Proceedings of the 10th ACM conference on Computer and communications security, New York, NY, USA, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Ganapathy, V.1
Jha, S.2
Chandler, D.3
Melski, D.4
Vitek, D.5
-
20
-
-
0036040515
-
Region-based memory management in cyclone
-
June
-
D. Grossman, G. Morrisett, T. Jim, M. Hicks, Y. Wang, and J. Cheney. Region-based memory management in cyclone. In Proc. ACM SIGPLAN Conf. on Programming language Design and Implementation (PLDI), June 2002.
-
(2002)
Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)
-
-
Grossman, D.1
Morrisett, G.2
Jim, T.3
Hicks, M.4
Wang, Y.5
Cheney, J.6
-
21
-
-
34247099396
-
Modular checking for buffer overflows in the large
-
Shanghai, China
-
B. Hackett, M. Das, D. Wang, and Z. Yang. Modular checking for buffer overflows in the large. In Proc. 28th Int'l Conf. on Software Engineering (ICSE), Shanghai, China, 2006.
-
(2006)
Proc. 28th Int'l Conf. on Software Engineering (ICSE)
-
-
Hackett, B.1
Das, M.2
Wang, D.3
Yang, Z.4
-
22
-
-
17044416757
-
Region-based shape analysis with tracked locations
-
New York, NY, USA. ACM Press
-
B. Hackett and R. Rugina. Region-based shape analysis with tracked locations. In POPL '05: Proceeding of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 310-323, New York, NY, USA, 2005. ACM Press.
-
(2005)
POPL '05: Proceeding of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 310-323
-
-
Hackett, B.1
Rugina, R.2
-
23
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Winter USENIX, 1992.
-
(1992)
Winter USENIX
-
-
Hastings, R.1
Joyce, B.2
-
24
-
-
35248827669
-
Software verification with Blast
-
T. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Software verification with Blast. In Tenth International Workshop on Model Checking of Software (SPIN), pages 235-239, 2003.
-
(2003)
Tenth International Workshop on Model Checking of Software (SPIN)
, pp. 235-239
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
27
-
-
0012582509
-
Backwards-compatible bounds checking for arrays and pointers in c programs
-
R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in c programs. In Automated and Algorithmic Debugging, pages 13-26, 1997.
-
(1997)
Automated and Algorithmic Debugging
, pp. 13-26
-
-
Jones, R.W.M.1
Kelly, P.H.J.2
-
28
-
-
0003904906
-
The omega library interface guide
-
Computer Science Dept., U. Maryland, College Park, Apr.
-
W. Kelly, V. Maslov, W. Pugh, E. Rosser, T. Shpeisman, and D. Wonnacott. The Omega Library Interface Guide. Technical report. Computer Science Dept., U. Maryland, College Park, Apr. 1996.
-
(1996)
Technical Report
-
-
Kelly, W.1
Maslov, V.2
Pugh, W.3
Rosser, E.4
Shpeisman, T.5
Wonnacott, D.6
-
29
-
-
31844445061
-
-
PhD thesis, Comp. Sci. Dept., Univ. of Illinois, Urbana, IL, May
-
C. Lattner. Macroscopic Data Structure Analysis and Optimization. PhD thesis, Comp. Sci. Dept., Univ. of Illinois, Urbana, IL, May 2005.
-
(2005)
Macroscopic Data Structure Analysis and Optimization
-
-
Lattner, C.1
-
33
-
-
33646032658
-
Ccured: Type-safe retrofitting of legacy software
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. Ccured: type-safe retrofitting of legacy software. ACM Transactions on Programming Language and Systems, 27(3):477-526, 2005.
-
(2005)
ACM Transactions on Programming Language and Systems
, vol.27
, Issue.3
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
37
-
-
0003647199
-
Programming with regions in the ML kit
-
M. Tofte, L. Birkedal, M. Elsman, N. Hallenberg, T. H. Olesen, P. Sestoft, and P. Bertelsen. Programming with Regions in the ML Kit. Technical Report DIKU-TR-97/12, 1997.
-
(1997)
Technical Report
, vol.DIKU-TR-97-12
-
-
Tofte, M.1
Birkedal, L.2
Elsman, M.3
Hallenberg, N.4
Olesen, T.H.5
Sestoft, P.6
Bertelsen, P.7
-
39
-
-
0027836576
-
Efficient software-based fault isolation
-
December
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. ACM SIGOPS Operating Systems Review, 27(5):203-216, December 1993.
-
(1993)
ACM SIGOPS Operating Systems Review
, vol.27
, Issue.5
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
40
-
-
1542317050
-
Archer: Using symbolic, path-sensitive analysis to detect memory access errors
-
Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. SIGSOFT Softw. Eng. Notes, 28(5):327-336, 2003.
-
(2003)
SIGSOFT Softw. Eng. Notes
, vol.28
, Issue.5
, pp. 327-336
-
-
Xie, Y.1
Chou, A.2
Engler, D.3
|