-
1
-
-
24144470812
-
Shape analysis by predicate abstraction
-
I. Balaban, A; Pnueli, and L. Zuck. Shape analysis by predicate abstraction. 6th VMCAI, pp164-180, 2005.
-
(2005)
6th VMCAI
, pp. 164-180
-
-
Balaban, I.1
Pnueli, A.2
Zuck, L.3
-
2
-
-
38349069881
-
Recency-abstraction for heap-allocated storage
-
this volume
-
G. Balakrishnan and T. Reps. Recency-abstraction for heap-allocated storage. 13th SAS (this volume), 2006.
-
(2006)
13th SAS
-
-
Balakrishnan, G.1
Reps, T.2
-
3
-
-
33646807486
-
Symbolic execution with separation logic
-
K. Yi, editor, APLAS 2005
-
J. Berdine, C. Calcagno, and P.W. O'Hearn. Symbolic execution with separation logic. In K. Yi, editor, APLAS 2005, volume 3780 of LNCS, 2005.
-
(2005)
LNCS
, vol.3780
-
-
Berdine, J.1
Calcagno, C.2
O'Hearn, P.W.3
-
5
-
-
70350303120
-
Automatic termination proofs for programs with shape-shifting heaps
-
to appear
-
J. Berdine, B. Cook, D. Distefano, and P. O'Hearn. Automatic termination proofs for programs with shape-shifting heaps. 18th CAV, to appear, 2006.
-
(2006)
18th CAV
-
-
Berdine, J.1
Cook, B.2
Distefano, D.3
O'Hearn, P.4
-
6
-
-
24644492502
-
Verifying programs with dynamic 1-selector-linked structures in regular model checking
-
A. Bouajjani, P. Habermehl, P. Moro, and T. Vojnar. Verifying programs with dynamic 1-selector-linked structures in regular model checking, 11th TACAS, pp13-29, 2005.
-
(2005)
11th TACAS
, pp. 13-29
-
-
Bouajjani, A.1
Habermehl, P.2
Moro, P.3
Vojnar, T.4
-
7
-
-
0025444591
-
Analysis of pointers and structures
-
D. Chase, M. Wegman, and F. Zadeck. Analysis of pointers and structures. PLDI, pp296-310, 1990.
-
(1990)
PLDI
, pp. 296-310
-
-
Chase, D.1
Wegman, M.2
Zadeck, F.3
-
8
-
-
0346348566
-
Multiword list items
-
W.T. Comfort. Multiword list items. CACM 7(6), pp357-362, 1964.
-
(1964)
CACM
, vol.7
, Issue.6
, pp. 357-362
-
-
Comfort, W.T.1
-
9
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. 4th POPL, pp238-252, 1977.
-
(1977)
4th POPL
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
10
-
-
0018294932
-
Systematic design of program analysis frameworks
-
P. Cousot and R. Cousot. Systematic design of program analysis frameworks. 6th POPL, pp269-282, 1979.
-
(1979)
6th POPL
, pp. 269-282
-
-
Cousot, P.1
Cousot, R.2
-
11
-
-
0000963996
-
Abstract interpretation frameworks
-
P. Cousot and R. Cousot. Abstract interpretation frameworks. J. Log. Comput. 2(4), pp511-547, 1992.
-
(1992)
J. Log. Comput.
, vol.2
, Issue.4
, pp. 511-547
-
-
Cousot, P.1
Cousot, R.2
-
12
-
-
24644450827
-
The ASTRÉE analyzer
-
P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, D. Monniaux, and X. Rival. The ASTRÉE analyzer. 14th ESOP, pp21-30, 2005.
-
(2005)
14th ESOP
, pp. 21-30
-
-
Cousot, P.1
Cousot, R.2
Feret, J.3
Mauborgne, L.4
Miné, A.5
Monniaux, D.6
Rival, X.7
-
13
-
-
85035003357
-
Automatic discovery of linear restraints among variables of a program
-
P. Cousot and N. Halbwachs. Automatic discovery of linear restraints among variables of a program. 5th POPL, pp84-96, 1978.
-
(1978)
5th POPL
, pp. 84-96
-
-
Cousot, P.1
Halbwachs, N.2
-
14
-
-
35048816889
-
Who is pointing when to whom? on the automated verification of linked list structures
-
D. Distefano, J.-P. Katoen, and A. Rensink. Who is pointing when to whom? On the automated verification of linked list structures. 24th FSTTCS, pp250-262, 2004.
-
(2004)
24th FSTTCS
, pp. 250-262
-
-
Distefano, D.1
Katoen, J.-P.2
Rensink, A.3
-
15
-
-
33745765468
-
A local shape analysis based on separation logic
-
D. Distefano, P. O'Hearn, and H. Yang. A local shape analysis based on separation logic. 16th TACAS, pp287-302, 2006.
-
(2006)
16th TACAS
, pp. 287-302
-
-
Distefano, D.1
O'Hearn, P.2
Yang, H.3
-
16
-
-
1442337851
-
Towards a realistic tool for statically detecting all buffer overflows in C
-
N. Dor, M. Rodeh, and M. Sagiv. Towards a realistic tool for statically detecting all buffer overflows in C. PLDI, pp155-167, 2003.
-
(2003)
PLDI
, pp. 155-167
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
18
-
-
33749847560
-
Interprocedural shape analysis with separated heap abstractions
-
to appear
-
A. Gotsman, J. Berdine, and B. Cook. Interprocedural shape analysis with separated heap abstractions. 13th SAS, to appear, 2006.
-
(2006)
13th SAS
-
-
Gotsman, A.1
Berdine, J.2
Cook, B.3
-
21
-
-
24644443912
-
Automatic verification of pointer programs using grammar-based shape analysis
-
O. Lee, H. Yang, and K. Yi. Automatic verification of pointer programs using grammar-based shape analysis. 14th ESOP, pp124-140, 2005.
-
(2005)
14th ESOP
, pp. 124-140
-
-
Lee, O.1
Yang, H.2
Yi, K.3
-
22
-
-
34547463929
-
Inferring invariants in Separation Logic for imperative list-processing programs
-
S. Magill, A. Nanevski, E. Clarke, and P. Lee. Inferring invariants in Separation Logic for imperative list-processing programs. 3rd SPACE Workshop, 2006.
-
(2006)
3rd SPACE Workshop
-
-
Magill, S.1
Nanevski, A.2
Clarke, E.3
Lee, P.4
-
23
-
-
35048882934
-
Partially disjunctive heap abstraction
-
R. Manevich, M. Sagiv, G. Ramalingam, and J. Field. Partially disjunctive heap abstraction, 11th SAS, pp265-279., 2004.
-
(2004)
11th SAS
, pp. 265-279
-
-
Manevich, R.1
Sagiv, M.2
Ramalingam, G.3
Field, J.4
-
24
-
-
24144463825
-
Predicate abstraction and canonical abstraction for singly-linked lists
-
R. Manevich, E. Yahav, G. Ramalingam, and M. Sagiv. Predicate abstraction and canonical abstraction for singly-linked lists. 6th VMCAI, pp181-198, 2005.
-
(2005)
6th VMCAI
, pp. 181-198
-
-
Manevich, R.1
Yahav, E.2
Ramalingam, G.3
Sagiv, M.4
-
25
-
-
33749828657
-
Verification of the heap manager of an operating system using separation logic
-
N. Marti, R. Affeldt, and A. Yonezawa. Verification of the heap manager of an operating system using separation logic. 3rd SPACE Workshop, 2006.
-
(2006)
3rd SPACE Workshop
-
-
Marti, N.1
Affeldt, R.2
Yonezawa, A.3
-
26
-
-
34250686292
-
Intermediate-representation recovery from low-level code
-
T. Reps, G. Balakrishnan, and J. Lim. Intermediate-representation recovery from low-level code. PEPM'06, ppl00-111, 2006.
-
(2006)
PEPM'06
-
-
Reps, T.1
Balakrishnan, G.2
Lim, J.3
-
27
-
-
0036051192
-
Separation logic: A logic for shared mutable data structures
-
J. C. Reynolds. Separation logic: A logic for shared mutable data structures. In 17th LICS, pp 55-74, 2002.
-
(2002)
17th LICS
, pp. 55-74
-
-
Reynolds, J.C.1
-
28
-
-
33749851344
-
-
Personal communication
-
Xavier Rival. Personal communication. 2005.
-
(2005)
-
-
Rival, X.1
-
29
-
-
27844444121
-
Symbolic bounds analysis of pointers, array indices, and accessed memory regions
-
R. Rugina and M. Rinard. Symbolic bounds analysis of pointers, array indices, and accessed memory regions. ACM TOPLAS, 27(2):185-235, 2005.
-
(2005)
ACM TOPLAS
, vol.27
, Issue.2
, pp. 185-235
-
-
Rugina, R.1
Rinard, M.2
-
30
-
-
0031598986
-
Solving shape-analysis problems in languages with destructive updating
-
M. Sagiv, T. Reps, and R. Wilhelm. Solving shape-analysis problems in languages with destructive updating. ACM TOPLAS, 20(1):1-50, 1998.
-
(1998)
ACM TOPLAS
, vol.20
, Issue.1
, pp. 1-50
-
-
Sagiv, M.1
Reps, T.2
Wilhelm, R.3
-
31
-
-
0039488517
-
Parametric shape analysis via 3valued logic
-
M. Sagiv, T. Reps, and R. Wilhelm. Parametric shape analysis via 3valued logic. ACM TOPLAS, 24(3):217-298, 2002.
-
(2002)
ACM TOPLAS
, vol.24
, Issue.3
, pp. 217-298
-
-
Sagiv, M.1
Reps, T.2
Wilhelm, R.3
-
32
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. Proceedings of NDSS, 2000.
-
(2000)
Proceedings of NDSS
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
33
-
-
33749859555
-
Building certified libraries for PCC: Dynamic storage allocation
-
D. Yu, N. A. Hamid, and Z. Shao. Building certified libraries for PCC: Dynamic storage allocation. 12th ESOP, pp363-379, 2003.
-
(2003)
12th ESOP
, pp. 363-379
-
-
Yu, D.1
Hamid, N.A.2
Shao, Z.3
|