-
1
-
-
84941164963
-
-
(FlexeLint) http://www.gimpel.com.
-
-
-
-
2
-
-
84941147937
-
-
(Coverity) http://www.coverity.com.
-
-
-
-
3
-
-
84941148458
-
-
(Fortify) http://www.fortifysoftwajre.com/products/sca.jsp.
-
-
-
-
4
-
-
33749645624
-
Static source code checking for user-defined properties
-
Pasadena, CA, USA
-
Holzmann, G.: Static source code checking for user-defined properties. In: Proc. IDPT 2002, Pasadena, CA, USA (2002) http://www.cs.bell-labs.com/what/ uno/index.html.
-
(2002)
Proc. IDPT 2002
-
-
Holzmann, G.1
-
5
-
-
70350760682
-
The SLAM toolkit
-
CAV
-
Ball, T., Rajamani, S.: The SLAM toolkit. In: CAV. Volume 2102 of LNCS. (2001)
-
(2001)
LNCS
, vol.2102
-
-
Ball, T.1
Rajamani, S.2
-
6
-
-
33749613625
-
Bandera: Extracting finite-state models from Java source code
-
Corbett, J., Dwyer, M., Hatcliff, J., Pasareanu, C., Robby, Laubach, S., H.Zheng: Bandera: extracting finite-state models from Java source code. In: ICSE. (2001) http://www.cis.ksu.edu/santos/bandera.
-
(2001)
ICSE
-
-
Corbett, J.1
Dwyer, M.2
Hatcliff, J.3
Pasareanu, C.4
Robby5
Laubach, S.6
Zheng, H.7
-
7
-
-
4243189286
-
Counterexample-guided abstraction refinement for symbolic model checking
-
Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5) (2003) 752-794
-
(2003)
J. ACM
, vol.50
, Issue.5
, pp. 752-794
-
-
Clarke, E.M.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
8
-
-
84937567800
-
Temporal-safety proofs for systems code
-
CAV
-
Henzinger, T.A., Jhala, R., Majumdar, R., Necula, G.C., Sutre, G., Weimer, W.: Temporal-safety proofs for systems code. In: CAV. Volume 2404 of LNCS. (2002)
-
(2002)
LNCS
, vol.2404
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Necula, G.C.4
Sutre, G.5
Weimer, W.6
-
9
-
-
2442623463
-
Abstractions from proofs
-
Henzinger, T.A., Jhala, R., Majumdar, R., McMillan, K.L.: Abstractions from proofs. In: POPL. (2004) 232-244
-
(2004)
POPL
, pp. 232-244
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
McMillan, K.L.4
-
10
-
-
0000223972
-
Parallel program schemata
-
Karp, R., Miller, R.: Parallel program schemata. J.CSS 3(2) (1969)
-
(1969)
J.CSS
, vol.3
, Issue.2
-
-
Karp, R.1
Miller, R.2
-
11
-
-
30944439123
-
GENERIC and GIMPLE: A new tree representation for entire functions
-
Merrill, J.: GENERIC and GIMPLE: A new tree representation for entire functions. In: First GCC Developers Summit. (2003) at www.gcc.gnu.org.
-
(2003)
First GCC Developers Summit
-
-
Merrill, J.1
-
12
-
-
84941156862
-
-
(Simplify) http://research.compaq.com/SRC/esc/Simplify.html.
-
-
-
-
14
-
-
84905008881
-
Program analysis as model checking of abstract interpretations
-
SAS., Springer Verlag
-
Schmidt, D., Steffen, B.: Program analysis as model checking of abstract interpretations. In: SAS. Volume 1503 of LNCS., Springer Verlag (1998)
-
(1998)
LNCS
, vol.1503
-
-
Schmidt, D.1
Steffen, B.2
-
15
-
-
0004072686
-
-
Addison-Wesley
-
Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools. Addison-Wesley (1987)
-
(1987)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
16
-
-
0018030792
-
On-the-fly garbage collection: An excercise in cooperation
-
Dijkstra, E., Lamport, L., Martin, A., Scholten, C., Steffens, E.: On-the-fly garbage collection: An excercise in cooperation. C.ACM 21(11) (1978)
-
(1978)
C.ACM
, vol.21
, Issue.11
-
-
Dijkstra, E.1
Lamport, L.2
Martin, A.3
Scholten, C.4
Steffens, E.5
-
17
-
-
0016543936
-
Guarded commands, nondeterminacy, and formal derivation of programs
-
Dijkstra, E.: Guarded commands, nondeterminacy, and formal derivation of programs. CACM 18(8) (1975)
-
(1975)
CACM
, vol.18
, Issue.8
-
-
Dijkstra, E.1
-
18
-
-
0000990322
-
A survey of program slicing techniques
-
Tip, F.: A survey of program slicing techniques. Journal of programming languages 3 (1995) 121-189
-
(1995)
Journal of Programming Languages
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
20
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
Necula, G., McPeak, S., Weimer, W.: CCured: type-safe retrofitting of legacy code. In: POPL. (2002)
-
(2002)
POPL
-
-
Necula, G.1
McPeak, S.2
Weimer, W.3
-
21
-
-
0030651806
-
Model checking for programming languages using Verisoft
-
Godefroid, P.: Model checking for programming languages using Verisoft. In: POPL. (1997)
-
(1997)
POPL
-
-
Godefroid, P.1
-
23
-
-
84960853881
-
Model checking programs
-
Visser, W., Havelund, K., Brat, G., Park, S.: Model checking programs. In: ICSE. (2000) http://ase.arc.nasa.gov/visser/jpf.
-
(2000)
ICSE
-
-
Visser, W.1
Havelund, K.2
Brat, G.3
Park, S.4
-
24
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
Hallem, S., Chelf, B., Xie, Y., Engler, D.: A system and language for building system-specific, static analyses. In: PLDI. (2002)
-
(2002)
PLDI
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
25
-
-
84941148751
-
-
(PolySpace) http://www.polyspace.com.
-
-
-
-
26
-
-
84941153847
-
-
(Klocwork) http://www.klocwork.com.
-
-
-
-
27
-
-
0036040604
-
ESP: Path-sensitive program verification in polynomial time
-
Das, M., Lerner, S., Seigle, M.: ESP: Path-sensitive program verification in polynomial time. In: PLDI. (2002)
-
(2002)
PLDI
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
29
-
-
0025628292
-
Reduction and covering of infinite reachability trees
-
Finkel, A.: Reduction and covering of infinite reachability trees. Information and Computation 89(2) (1990)
-
(1990)
Information and Computation
, vol.89
, Issue.2
-
-
Finkel, A.1
-
30
-
-
85007553476
-
On model checking for non-deterministic infinite-state systems
-
Emerson, E., Namjoshi, K.S.: On model checking for non-deterministic infinite-state systems. In: LICS. (1998)
-
(1998)
LICS
-
-
Emerson, E.1
Namjoshi, K.S.2
-
31
-
-
0036036098
-
Extended static checking for Java
-
Flanagan, C., Leino, K.M., Lillibridge, M., Nelson, G., Saxe, J., Stata, R.: Extended static checking for Java. In: PLDI. (2002)
-
(2002)
PLDI
-
-
Flanagan, C.1
Leino, K.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.5
Stata, R.6
-
32
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
Larochelle, D., Evans, D.: Statically detecting likely buffer overflow vulnerabilities. In: USENIX Security Symposium. (2001)
-
(2001)
USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
33
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
Bush, W., Pincus, J., Sielaff, D.: A static analyzer for finding dynamic programming errors. Software: Practice and Experience 30(7) (2000) 775-802
-
(2000)
Software: Practice and Experience
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.1
Pincus, J.2
Sielaff, D.3
-
34
-
-
84879543945
-
Model checking of unrestricted hierarchical state machines
-
icalp 2001. ICALP
-
Benedikt, M., Godefroid, P., Reps, T.: Model checking of unrestricted hierarchical state machines. icalp 2001: 652-666. In: ICALP. Volume 2076 of LNCS. (2001)
-
(2001)
LNCS
, vol.2076
, pp. 652-666
-
-
Benedikt, M.1
Godefroid, P.2
Reps, T.3
-
35
-
-
84958771695
-
Analysis of recursive state machines
-
CAV
-
Alur, R., Etessami, K., Yannakakis, M.: Analysis of recursive state machines. In: CAV. Volume 2102 of LNCS. (2001)
-
(2001)
LNCS
, vol.2102
-
-
Alur, R.1
Etessami, K.2
Yannakakis, M.3
-
36
-
-
84941161827
-
-
(CVC Lite) http://chicory.staaford.edu/CVCL/.
-
-
-
-
37
-
-
84941162868
-
-
(CBMC) http://www.cs.cmu.edu/~modelcheck/cbmc/.
-
-
-
-
38
-
-
24644450827
-
The ASTRÉE analyser
-
Sagiv, M., ed.: Proceedings of the European Symposium on Programming (ESOP'05), Edinburgh, Scotland, © Springer
-
Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Miné, A., Monniaux, D., Rival, X.: The ASTRÉE Analyser. In Sagiv, M., ed.: Proceedings of the European Symposium on Programming (ESOP'05). Volume 3444 of Lecture Notes in Computer Science., Edinburgh, Scotland, © Springer (2005) 21-30
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 21-30
-
-
Cousot, P.1
Cousot, R.2
Feret, J.3
Mauborgne, L.4
Miné, A.5
Monniaux, D.6
Rival, X.7
-
39
-
-
26444620059
-
Incremental algorithms for inter-procedural analysis of safety properties
-
Etessami, K., Rajamani, S.K., eds.: Computer Aided Verification
-
Conway, C.L., Namjoshi, K.S., Dams, D., Edwards, S.A.: Incremental algorithms for inter-procedural analysis of safety properties. In Etessami, K., Rajamani, S.K., eds.: Computer Aided Verification. Number 3576 in LNCS (2005) 449-461
-
(2005)
LNCS
, vol.3576
, pp. 449-461
-
-
Conway, C.L.1
Namjoshi, K.S.2
Dams, D.3
Edwards, S.A.4
|