-
2
-
-
16444364317
-
-
Available at
-
The SUIF 2 Compiler System. Available at http://suif.stanford.edu/suif/ suif2/index.html.
-
The SUIF 2 Compiler System
-
-
-
3
-
-
34247368775
-
-
The vortex project. Available at
-
The vortex project. Available at http://www.cs.washington.edu/research/ projects/cecil/www/vortex.html.
-
-
-
-
4
-
-
84957037636
-
A toolkit for constructing type- and constraint-based program analyses
-
A. Aiken, M. Fahndrich, J. S. Foster, and Z. Su. A toolkit for constructing type- and constraint-based program analyses. In Types in Compilation, pages 78-96, 1998.
-
(1998)
Types in Compilation
, pp. 78-96
-
-
Aiken, A.1
Fahndrich, M.2
Foster, J.S.3
Su, Z.4
-
5
-
-
34247332553
-
-
American National Standards Institute, 1430 Broadway, New York, NY 10018, USA. ANSI Fortran X3.9-1978, 1978. Approved April 3, 1978 (also known as Fortran 77).
-
American National Standards Institute, 1430 Broadway, New York, NY 10018, USA. ANSI Fortran X3.9-1978, 1978. Approved April 3, 1978 (also known as Fortran 77).
-
-
-
-
10
-
-
0030092390
-
Checking for race conditions in file accesses
-
M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131-152, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
11
-
-
25644452721
-
Model Checking One Million Lines of C Code
-
San Diego, CA, Feb. 4-6
-
H. Chen, D. Dean, and D. Wagner. Model Checking One Million Lines of C Code. In Proceedings of the 11th Annual Network and Distributed System Security Symposium, San Diego, CA, Feb. 4-6, 2004.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium
-
-
Chen, H.1
Dean, D.2
Wagner, D.3
-
13
-
-
34247338386
-
Abstract interpretation based static analysis parameterized by semantics
-
London, UK, Springer-Verlag
-
P. Cousot. Abstract interpretation based static analysis parameterized by semantics. In SAS '97: Proceedings of the 4th International Symposium on Static Analysis, pages 388-394, London, UK, 1997. Springer-Verlag.
-
(1997)
SAS '97: Proceedings of the 4th International Symposium on Static Analysis
, pp. 388-394
-
-
Cousot, P.1
-
15
-
-
0026865713
-
GENOA: A customizable language-and front-end independent code analyzer
-
P. T. Devanbu. GENOA: A customizable language-and front-end independent code analyzer. In International Conference on Software Engineering, pages 307-317, 1992.
-
(1992)
International Conference on Software Engineering
, pp. 307-317
-
-
Devanbu, P.T.1
-
16
-
-
0013301433
-
JLAPACK - Compiling LAPACK Fortran to Java
-
Technical report, University of Tennessy, June, Available at
-
D. M. Doolin, J. Dongarra, and K. Seymour. JLAPACK - Compiling LAPACK Fortran to Java. Technical report, University of Tennessy, June 1998. Available at http://www.cs.utk.edu/library/TechReports/1998/ut-cs-98-390.ps.Z.
-
(1998)
-
-
Doolin, D.M.1
Dongarra, J.2
Seymour, K.3
-
17
-
-
77956610621
-
Aiding program comprehension by static and dynamic feature analysis
-
T. Eisenbarth, R. Koschke, and D. Simon. Aiding program comprehension by static and dynamic feature analysis. In ICSM, pages 602-611, 2001.
-
(2001)
ICSM
, pp. 602-611
-
-
Eisenbarth, T.1
Koschke, R.2
Simon, D.3
-
18
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
October
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of the Fourth Symposium on Operation System Design and Implementation (OSDI), October 2000.
-
(2000)
Proceedings of the Fourth Symposium on Operation System Design and Implementation (OSDI)
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
23
-
-
3142582577
-
Buffer overrun detection using linear programming and static analysis
-
Washington, DC
-
V. Ganapathy, S. Jha, D. Chandler, D. Melski, and D. Vitek. Buffer overrun detection using linear programming and static analysis. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 345-354, Washington, DC, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 345-354
-
-
Ganapathy, V.1
Jha, S.2
Chandler, D.3
Melski, D.4
Vitek, D.5
-
25
-
-
34247402437
-
-
IBM. The toronto portable optimizer
-
IBM. The toronto portable optimizer.
-
-
-
-
26
-
-
34247379765
-
INTELLECT: INTErmediate-Language LEvel C Translator
-
Technical Report 23907, IBM, 2006. Available at
-
S. K. Jain, G. Marceau, X. Zhang, L. Koved, and T. Jaeger. INTELLECT: INTErmediate-Language LEvel C Translator. Technical Report 23907, IBM, 2006. Available at http://domino.research.ibm.com/library/cyberdig.nsf/-index.html.
-
-
-
Jain, S.K.1
Marceau, G.2
Zhang, X.3
Koved, L.4
Jaeger, T.5
-
27
-
-
34247356029
-
-
Jazillian, Inc, Available at
-
Jazillian, Inc. How to convert c to Java. Available at http://jazillian.com/how.html.
-
How to convert c to Java
-
-
-
30
-
-
0038108908
-
Access rights analysis for Java
-
November
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access rights analysis for Java. In Proceedings of the 17th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2002), pages 359-372, November 2002.
-
(2002)
Proceedings of the 17th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2002)
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
33
-
-
34247373359
-
-
J. Martin. Ephedra, - a c to Java migration environment, April 2002. Ph.D. Dissertation, University of Victoria, Kanada. Available at http://ovid.tigris.org/Ephedra/.
-
J. Martin. Ephedra, - a c to Java migration environment, April 2002. Ph.D. Dissertation, University of Victoria, Kanada. Available at http://ovid.tigris.org/Ephedra/.
-
-
-
-
38
-
-
26444502057
-
Interprocedural analysis for privileged code placement and tainted variable detection
-
ECOOP 2005, Object-Oriented Programming: 19th European Conference, Glasgow, UK, July 25-29, 2005. Proceedings, of, Springer, Aug
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural analysis for privileged code placement and tainted variable detection. In ECOOP 2005 - Object-Oriented Programming: 19th European Conference, Glasgow, UK, July 25-29, 2005. Proceedings, volume 3586 of Lecture Notes in Computer Science, pages 362-386. Springer, Aug. 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3586
, pp. 362-386
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
40
-
-
35248819232
-
Dimensions of Precision in Reference Analysis of Object-Oriented Languages
-
Warsaw, Poland, April, Invited Paper
-
B. G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Languages. In Proceedings of the 12th International Conference on Compiler Construction, pages 126-137, Warsaw, Poland, April 2003. Invited Paper.
-
(2003)
Proceedings of the 12th International Conference on Compiler Construction
, pp. 126-137
-
-
Ryder, B.G.1
-
41
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
42
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the Tenth USENIX Security Symposium, pages 201-216, 2001.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 201-216
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
43
-
-
0027592833
-
Extending typestate checking using conditional liveness analysis
-
May
-
R. E. Strom and D. M. Yellin. Extending typestate checking using conditional liveness analysis. IEEE Transactions on Software Engineering, 19(5):478-485, May 1993.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.5
, pp. 478-485
-
-
Strom, R.E.1
Yellin, D.M.2
-
44
-
-
0022605097
-
Typestate: A programming language concept for enhancing software reliability
-
Jan
-
R. E. Strom and S. Yemini. Typestate: A programming language concept for enhancing software reliability. IEEE Transactions on Software Engineering, 12(1):157-171, Jan. 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
, pp. 157-171
-
-
Strom, R.E.1
Yemini, S.2
-
47
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: General security support for the linux kernel. In Proceedings of the 11th USENIX Security Symposium, 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
Smalley, S.4
Kroah-Hartman, G.5
-
48
-
-
8344280849
-
Verifying safety properties using separation and heterogeneous abstractions
-
New York, NY, USA, ACM Press
-
E. Yahav and G. Ramalingam. Verifying safety properties using separation and heterogeneous abstractions. In PLDI '04: Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, pages 25-34, New York, NY, USA, 2004. ACM Press.
-
(2004)
PLDI '04: Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation
, pp. 25-34
-
-
Yahav, E.1
Ramalingam, G.2
-
50
-
-
34247400575
-
Applying Static Analysis to Verifying Security Properties
-
Chicago, IL, Also available as IBM technical report RC23246 at
-
X. Zhang, T. Jaegert, and L. Koved. Applying Static Analysis to Verifying Security Properties. In Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference, Chicago, IL, 2004. Also available as IBM technical report RC23246 at http://domino.research.ibm.com/library/cyberdig.nsf/ index.html.
-
(2004)
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference
-
-
Zhang, X.1
Jaegert, T.2
Koved, L.3
|