-
1
-
-
0016555241
-
The Protection of Information in Computer Systems
-
September
-
J. H. Saltzer and M. D. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE 63, No. 9, 1278-1308 (September 1975).
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
2
-
-
84871806446
-
-
Common Criteria, http://www.commoncriteriaportal.org.
-
Common Criteria
-
-
-
4
-
-
34250338671
-
-
Open Web Application Security Project
-
Open Web Application Security Project, http://www.owasp.org.
-
-
-
-
5
-
-
34250352125
-
-
U.S. Department of Homeland Security
-
U.S. Department of Homeland Security, http://www.dhs.gov.
-
-
-
-
6
-
-
34250307402
-
-
National Vulnerability Database, U.S. Commerce Department
-
National Vulnerability Database, National Institute of Standards and Technology, U.S. Commerce Department, http://nvd.nist.gov.
-
-
-
-
8
-
-
84887507059
-
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2
-
Monterey, CA, USA December
-
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2," USENIX Symposium on Internet Technologies and Systems, Monterey, CA, USA (December 1997).
-
(1997)
USENIX Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
9
-
-
0004286931
-
-
2nd ed, Upper Saddle River, NJ, USA, Prentice Hall PTR August
-
M. Pistoia, D. Reller, D. Gupta, M. Nagnur, and A. K. Ramani, Java 2 Network Security, 2nd ed., Upper Saddle River, NJ, USA, Prentice Hall PTR (August 1999).
-
(1999)
Java 2 Network Security
-
-
Pistoia, M.1
Reller, D.2
Gupta, D.3
Nagnur, M.4
Ramani, A.K.5
-
10
-
-
0002357382
-
Role-Based Access Controls
-
Baltimore, MD, USA October
-
D. F. Ferraiolo and D. R. Kuhn, "Role-Based Access Controls," Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, USA (October 1992), pp. 554-563.
-
(1992)
Proceedings of the 15th NIST-NCSC National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
-
11
-
-
26444562678
-
-
Reading, MA, USA, Addison-Wesley February
-
M. Pistoia, N. Nagaratnam, L. Koved, and A. Nadalin, Enterprise Java Security, Reading, MA, USA, Addison-Wesley (February 2004).
-
(2004)
Enterprise Java Security
-
-
Pistoia, M.1
Nagaratnam, N.2
Koved, L.3
Nadalin, A.4
-
12
-
-
21644484975
-
-
Sebastopol, CA, USA, O'Reilly & Associates, Inc, June
-
A. Freeman and A. Jones, Programming .NET Security, Sebastopol, CA, USA, O'Reilly & Associates, Inc. (June 2003).
-
(2003)
Programming .NET Security
-
-
Freeman, A.1
Jones, A.2
-
13
-
-
26444597311
-
Static Analysis of Role-Based Access Control in J2EE Applications
-
September
-
G. Naumovich and P. Centonze, "Static Analysis of Role-Based Access Control in J2EE Applications," SIGSOFT Software Engineering Notes 29, No. 5, 1-10 (September 2004).
-
(2004)
SIGSOFT Software Engineering Notes
, vol.29
, Issue.5
, pp. 1-10
-
-
Naumovich, G.1
Centonze, P.2
-
14
-
-
34247363687
-
Role-Based Access Control Consistency Validation
-
Portland, Maine, USA July
-
P. Centonze, G. Naumovich, S. J. Fink, and M. Pistoia, "Role-Based Access Control Consistency Validation," Proceedings of the International Symposium on Software Testing and Analysis (ISSTA '06), Portland, Maine, USA (July 2006), pp. 121-132.
-
(2006)
Proceedings of the International Symposium on Software Testing and Analysis (ISSTA '06)
, pp. 121-132
-
-
Centonze, P.1
Naumovich, G.2
Fink, S.J.3
Pistoia, M.4
-
15
-
-
85084162287
-
Setuid Demystified
-
Berkeley, CA, USA, USENIX Association August
-
H. Chen, D. Wagner, and D. Dean, "Setuid Demystified," Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, USENIX Association (August 2002), pp. 171-190.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 171-190
-
-
Chen, H.1
Wagner, D.2
Dean, D.3
-
16
-
-
0012889295
-
-
Cornell University, Ithaca, NY, USA, Technical Report TR2000-1825 November
-
F. Schneider, G. Morrisett, and R. Harper, "A Language-Based Approach to Security," Cornell University, Ithaca, NY, USA, Technical Report TR2000-1825 (November 2000).
-
(2000)
A Language-Based Approach to Security
-
-
Schneider, F.1
Morrisett, G.2
Harper, R.3
-
17
-
-
0039334688
-
SAFKASI: A Security Mechanism for Language-Based Systems
-
D. S. Wallach, A. W. Appel, and E. W. Felten, "SAFKASI: A Security Mechanism for Language-Based Systems," ACM Transactions on Software Engineering and Methodology (TOSEM) 9, No. 4, 341-378 (2000).
-
(2000)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
18
-
-
0031677290
-
Understanding Java Stack Inspection
-
Oakland, CA, USA, IEEE Computer Society Press May
-
D. S. Wallach and E. W. Felten, "Understanding Java Stack Inspection," Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society Press (May 1998), pp. 52-63.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 52-63
-
-
Wallach, D.S.1
Felten, E.W.2
-
19
-
-
84945270736
-
A Systematic Approach to Static Access Control
-
Springer-Verlag
-
F. Pottier, C. Skalka, and S. F. Smith, "A Systematic Approach to Static Access Control," Proceedings of the 10th European Symposium on Programming Languages and Systems, Springer-Verlag (2001), pp. 30-45.
-
(2001)
Proceedings of the 10th European Symposium on Programming Languages and Systems
, pp. 30-45
-
-
Pottier, F.1
Skalka, C.2
Smith, S.F.3
-
20
-
-
0032667088
-
Verification of Control Flow Based Security Properties
-
Oakland, CA, USA May
-
T. P. Jensen, D. L. Métayer, and T. Thorn, "Verification of Control Flow Based Security Properties," Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 1999) pp. 89-103.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 89-103
-
-
Jensen, T.P.1
Métayer, D.L.2
Thorn, T.3
-
21
-
-
18944377182
-
Static Analysis for Stack Inspection
-
Amsterdam, The Netherlands, Elsevier
-
M. Bartoletti, P. Degano, and G. L. Ferrari, "Static Analysis for Stack Inspection," Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science 54, Amsterdam, The Netherlands, Elsevier (2001), pp. 69-80.
-
(2001)
Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science
, vol.54
, pp. 69-80
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
22
-
-
0004312442
-
-
Stevens Institute of Technology, Hoboken, NJ, USA, Technical Report CS2001-1 July
-
A. Banerjee and D. A. Naumann, "A Simple Semantics and Static Analysis for Java Security," Stevens Institute of Technology, Hoboken, NJ, USA, Technical Report CS2001-1 (July 2001).
-
(2001)
A Simple Semantics and Static Analysis for Java Security
-
-
Banerjee, A.1
Naumann, D.A.2
-
23
-
-
0033724116
-
IRM Enforcement of Java Stack Inspection
-
Oakland, CA, USA, IEEE Computer Society May
-
U. Erlingsson and F. B. Schneider, "IRM Enforcement of Java Stack Inspection," Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society (May 2000), pp. 246-255.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 246-255
-
-
Erlingsson, U.1
Schneider, F.B.2
-
24
-
-
35248819232
-
Dimensions of Precision in Reference Analysis of Object-Oriented Languages
-
Warsaw, Poland April, invited paper
-
B. G. Ryder, "Dimensions of Precision in Reference Analysis of Object-Oriented Languages," Proceedings of the 12th International Conference on Compiler Construction, Warsaw, Poland (April 2003), pp. 126-137, invited paper.
-
(2003)
Proceedings of the 12th International Conference on Compiler Construction
, pp. 126-137
-
-
Ryder, B.G.1
-
25
-
-
84969377247
-
User Authentication and Authorization in the Java™ Platform
-
Scottsdale, AZ, USA, IEEE Computer Security December
-
C. Lai, L. Gong, L. Koved, A. J. Nadalin, and R. Schemers, "User Authentication and Authorization in the Java™ Platform," Proceedings of the 15th Annual Computer Security Applications Conference, Scottsdale, AZ, USA, IEEE Computer Security (December 1999), pp. 285-290.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 285-290
-
-
Lai, C.1
Gong, L.2
Koved, L.3
Nadalin, A.J.4
Schemers, R.5
-
26
-
-
34250331396
-
A Unified Mathematical Model for Stack- and Role-Based Authorization Systems,
-
Ph.D. dissertation, Polytechnic University, Brooklyn, NY, USA May
-
M. Pistoia, "A Unified Mathematical Model for Stack- and Role-Based Authorization Systems," Ph.D. dissertation, Polytechnic University, Brooklyn, NY, USA (May 2005).
-
(2005)
-
-
Pistoia, M.1
-
27
-
-
34247389562
-
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
-
Glasgow, Scotland, UK, Springer-Verlag July
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar, "Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection," Proceedings of the 9th European Conference on Object-Oriented Programming, Glasgow, Scotland, UK, Springer-Verlag (July 2005).
-
(2005)
Proceedings of the 9th European Conference on Object-Oriented Programming
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
29
-
-
0015742560
-
A Unified Approach to Global Program Optimization
-
Boston, MA, USA, ACM Press
-
G. A. Kildall, "A Unified Approach to Global Program Optimization," Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages. Boston, MA, USA, ACM Press (1973), pp. 194-206.
-
(1973)
Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages
, pp. 194-206
-
-
Kildall, G.A.1
-
30
-
-
0030086382
-
Role-Based Access Control Models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," IEEE Computer 29, No. 2, 38-47 (February 1996).
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
31
-
-
0242625217
-
A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions
-
Monterey, CA, USA, ACM Press
-
A. Schaad and J. D. Moffett, "A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions," Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA, USA, ACM Press (2002), pp. 13-22.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
33
-
-
0033698475
-
Alcoa: The Alloy Constraint Analyzer
-
Limerick, Ireland, ACM Press
-
D. Jackson, I. Schechter, and H. Shlyahter, "Alcoa: The Alloy Constraint Analyzer," Proceedings of the 22nd International Conference on Software Engineering, Limerick, Ireland, ACM Press (2000), pp. 730-733.
-
(2000)
Proceedings of the 22nd International Conference on Software Engineering
, pp. 730-733
-
-
Jackson, D.1
Schechter, I.2
Shlyahter, H.3
-
34
-
-
85001697848
-
A Fine-Grained Access Control System for XML Documents
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati, "A Fine-Grained Access Control System for XML Documents," ACM Transactions on Information Systems Security 5, No. 2, 169-202 (2002).
-
(2002)
ACM Transactions on Information Systems Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
35
-
-
0034450091
-
XML Document Security Based on Provisional Authorization
-
Athens, Greece, ACM Press November
-
M. Kudo and S. Hada, "XML Document Security Based on Provisional Authorization," Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, ACM Press (November 2000), pp. 87-96.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 87-96
-
-
Kudo, M.1
Hada, S.2
-
36
-
-
4544248702
-
XML Access Control Using Static Analysis
-
Washington, DC, USA, ACM Press October
-
M. Murata, A. Tozawa, M. Kudo, and S. Hada, "XML Access Control Using Static Analysis," Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, ACM Press (October 2003), pp. 73-84.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Murata, M.1
Tozawa, A.2
Kudo, M.3
Hada, S.4
-
37
-
-
0035009417
-
Analysis and Testing of Web Applications
-
Toronto, ON, Canada, IEEE Computer Society
-
F. Ricca and P. Tonella, "Analysis and Testing of Web Applications," Proceedings of the 23rd International Conference on Software Engineering, Toronto, ON, Canada, IEEE Computer Society (2001), pp. 25-34.
-
(2001)
Proceedings of the 23rd International Conference on Software Engineering
, pp. 25-34
-
-
Ricca, F.1
Tonella, P.2
-
38
-
-
1442313098
-
Saving the World from Bad Beans: Deployment-Time Confinement Checking
-
Anaheim, CA, USA, ACM Press
-
D. Clarke, M. Richmond, and J. Noble, "Saving the World from Bad Beans: Deployment-Time Confinement Checking," Proceedings of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications, Anaheim, CA, USA, ACM Press (2003), pp. 374-387.
-
(2003)
Proceedings of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications
, pp. 374-387
-
-
Clarke, D.1
Richmond, M.2
Noble, J.3
-
39
-
-
34548808043
-
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
-
Minneapolis, MN, USA forthcoming, May
-
M. Pistoia, S. J. Fink, R. J. Flynn, and E. Yahav, "When Role Models Have Flaws: Static Validation of Enterprise Security Policies," Proceedings of the International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA (forthcoming, May 2007).
-
(2007)
Proceedings of the International Conference on Software Engineering (ICSE 2007)
-
-
Pistoia, M.1
Fink, S.J.2
Flynn, R.J.3
Yahav, E.4
-
40
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
July
-
D. E. Denning and P. J. Denning, "Certification of Programs for Secure Information Flow," Communications of the ACM 20, No. 7, 504-513 (July 1977).
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
41
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D. E. Denning, "A Lattice Model of Secure Information Flow," Communications of the ACM 19, No. 5, 236-243 (May 1976).
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
42
-
-
0004277741
-
-
2nd ed, Boston, MA, USA, Birkhäuser January
-
G. Grätzer, General Lattice Theory, 2nd ed., Boston, MA, USA, Birkhäuser (January 2003).
-
(2003)
General Lattice Theory
-
-
Grätzer, G.1
-
43
-
-
0020299523
-
Security Policies and Security Models
-
Oakland, CA, USA, IEEE Computer Society Press May
-
J. A. Goguen and J. Meseguer, "Security Policies and Security Models," Proceedings of the 1982 IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society Press (May 1982), pp. 11-20.
-
(1982)
Proceedings of the 1982 IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
44
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
San Diego, CA, USA, IEEE Computer Society February
-
J. Newsome and D. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software," Proceedings of the 12th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, IEEE Computer Society (February 2005), http://jimnewsome.net/papers/taintcheck.pdf.
-
(2005)
Proceedings of the 12th Annual Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
45
-
-
0036086884
-
Using Programmer-Written Compiler Extensions to Catch Security Holes
-
Oakland, CA, USA, IEEE Computer Society May
-
K. Ashcraft and D. Engler, "Using Programmer-Written Compiler Extensions to Catch Security Holes," Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society (May 2002), pp. 143-159.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 143-159
-
-
Ashcraft, K.1
Engler, D.2
-
47
-
-
0030370740
-
A Sound Type System for Secure Flow Analysis
-
January
-
D. Volpano, C. Irvine, and G. Smith, "A Sound Type System for Secure Flow Analysis," Journal of Computer Security 4, Nos. 2-3, 167-187 (January 1996).
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
48
-
-
0031543270
-
A Decentralized Model for Information Flow Control
-
Saint Malo, France, ACM Press October
-
A. C. Myers and B. Liskov, "A Decentralized Model for Information Flow Control," Proceedings of the 16th ACM Symposium on Operating Systems Principles, Saint Malo, France, ACM Press (October 1997), pp. 129-142.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
49
-
-
0022278941
-
A Security Analysis of VAX VMS
-
ACM Press
-
J. F. Koegel, R. M. Koegel, Z. Li, and D. T. Miruke, "A Security Analysis of VAX VMS," ACM '85: Proceedings of the 1985 ACM Annual Conference on the Range of Computing: Mid-80's Perspective, ACM Press (1985), pp. 381-386.
-
(1985)
ACM '85: Proceedings of the 1985 ACM Annual Conference on the Range of Computing: Mid-80's Perspective
, pp. 381-386
-
-
Koegel, J.F.1
Koegel, R.M.2
Li, Z.3
Miruke, D.T.4
-
50
-
-
0004207406
-
-
3rd ed, Sebastopol, CA, USA, O'Reilly and Associates, Inc, July
-
L. Wall, T. Christiansen, and J. Orwant, Programming Perl, 3rd ed., Sebastopol, CA, USA, O'Reilly and Associates, Inc. (July 2000).
-
(2000)
Programming Perl
-
-
Wall, L.1
Christiansen, T.2
Orwant, J.3
-
51
-
-
85084164620
-
Detecting Format String Vulnerabilities with Type Qualifiers
-
Washington, DC, USA August
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner, "Detecting Format String Vulnerabilities with Type Qualifiers," Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA (August 2001), pp. 201-220.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
52
-
-
0036036247
-
Flow-Sensitive Type Qualifiers
-
Berlin, Germany June
-
J. S. Foster, T. Terauchi, and A. Aiken, "Flow-Sensitive Type Qualifiers," Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation, Berlin, Germany (June 2002), pp. 1-12.
-
(2002)
Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 1-12
-
-
Foster, J.S.1
Terauchi, T.2
Aiken, A.3
-
53
-
-
33750912954
-
Efficient Path Conditions in Dependence Graphs for Software Safety Analysis
-
G. Snelting, T. Robschink, and J. Krinke, "Efficient Path Conditions in Dependence Graphs for Software Safety Analysis," ACM Transactions on Software Engineering and Methodology 15, No. 4, 410-457 (2006).
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.4
, pp. 410-457
-
-
Snelting, G.1
Robschink, T.2
Krinke, J.3
-
54
-
-
34250357872
-
Information Flow Control for Java Based on Path Conditions in Dependence Graphs
-
Arlington, Virginia, USA
-
C. Hammer, J. Krinke, and G. Snelting, "Information Flow Control for Java Based on Path Conditions in Dependence Graphs," Proceedings of IEEE International Symposium on Secure Software Engineering, Arlington, Virginia, USA (2006), pp. 87-96.
-
(2006)
Proceedings of IEEE International Symposium on Secure Software Engineering
, pp. 87-96
-
-
Hammer, C.1
Krinke, J.2
Snelting, G.3
-
56
-
-
84923564816
-
Finding Security Vulnerabilities in Java Applications with Static Analysis
-
V. B. Livshits and M. S. Lam, "Finding Security Vulnerabilities in Java Applications with Static Analysis," Usenix Security Symposium (2005).
-
(2005)
Usenix Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
58
-
-
79951744451
-
Finding Bugs Is Easy
-
New York, NY, USA, ACM Press
-
D. Hovemeyer and W. Pugh, "Finding Bugs Is Easy," OOPSLA '04: Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications, New York, NY, USA, ACM Press (2004), pp. 132-136.
-
(2004)
OOPSLA '04: Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications
, pp. 132-136
-
-
Hovemeyer, D.1
Pugh, W.2
-
59
-
-
34250373121
-
-
PMD
-
PMD, http://sourceforge.net/projects/pmd/.
-
-
-
-
61
-
-
0022605097
-
Typestate: A Programming Language Concept for Enhancing Software Reliability
-
R. E. Strom and S. Yemini, "Typestate: A Programming Language Concept for Enhancing Software Reliability," IEEE Transactions on Software Engineering 12, No. 1, pp. 157-171 (1986).
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
, pp. 157-171
-
-
Strom, R.E.1
Yemini, S.2
-
62
-
-
0036983315
-
Automatic Extraction of Object-Oriented Component Interfaces
-
July
-
J. Whaley, M. C. Martin, and M. S. Lam, "Automatic Extraction of Object-Oriented Component Interfaces," Proceedings of the International Symposium on Software Testing and Analysis (July 2002), pp. 218-228, http://citeseer.ist.psu.edu/525755.html.
-
(2002)
Proceedings of the International Symposium on Software Testing and Analysis
, pp. 218-228
-
-
Whaley, J.1
Martin, M.C.2
Lam, M.S.3
-
63
-
-
17044362578
-
Synthesis of Interface Specifications for Java Classes
-
R. Alur, P. Cerny, P. Madhusudan, and W. Nam, "Synthesis of Interface Specifications for Java Classes," SIGPLAN Notices 40, No. 1, pp. 98-109 (2005).
-
(2005)
SIGPLAN Notices
, vol.40
, Issue.1
, pp. 98-109
-
-
Alur, R.1
Cerny, P.2
Madhusudan, P.3
Nam, W.4
-
64
-
-
0027592833
-
Extending Typestate Checking Using Conditional Liveness Analysis
-
May
-
R. E. Strom and D. M. Yellin, "Extending Typestate Checking Using Conditional Liveness Analysis," IEEE Transactions on Software Engineering 19, No. 5, 478-485 (May 1993).
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.5
, pp. 478-485
-
-
Strom, R.E.1
Yellin, D.M.2
-
67
-
-
0036036247
-
Flow-Sensitive Type Qualifiers
-
Berlin June
-
J. S. Foster, T. Terauchi, and A. Aiken, "Flow-Sensitive Type Qualifiers," Proceedings of ACM Conference on Programming Language Design and Implementation, Berlin (June 2002), pp. 1-12.
-
(2002)
Proceedings of ACM Conference on Programming Language Design and Implementation
, pp. 1-12
-
-
Foster, J.S.1
Terauchi, T.2
Aiken, A.3
-
68
-
-
0036036098
-
Extended Static Checking for Java
-
Berlin June
-
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata, "Extended Static Checking for Java," Proceedings of ACM Conference on Programming Language Design and Implementation, Berlin (June 2002), pp. 234-245.
-
(2002)
Proceedings of ACM Conference on Programming Language Design and Implementation
, pp. 234-245
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
69
-
-
0036039970
-
Role Analysis
-
Portland, Maine January
-
V. Kuncak, P. Lam, and M. Rinard, "Role Analysis," Proceedings of ACM Symposium on Principles of Programming Languages, Portland, Maine (January 2002), pp. 17-32.
-
(2002)
Proceedings of ACM Symposium on Principles of Programming Languages
, pp. 17-32
-
-
Kuncak, V.1
Lam, P.2
Rinard, M.3
-
70
-
-
1442288804
-
ACM SIGPLAN Notices 38, No. 5, 129-140 (May 2003), in Conference on Programming Language Design and Implementation (PLDI)
-
A. Aiken, J. S. Foster, J. Kodumal, and T. Terauchi, "Checking and Inferring Local Non-aliasing," ACM SIGPLAN Notices 38, No. 5, 129-140 (May 2003), in Conference on Programming Language Design and Implementation (PLDI).
-
-
-
Aiken, A.1
Foster, J.S.2
Kodumal, J.3
Terauchi, T.4
-
71
-
-
0033697422
-
Bandera: Extracting Finite-State Models from Java Source Code
-
June
-
J. C. Corbett, M. Dwyer, J. Hatcliff, C. Pasareanu, Robby, S. Laubach, and H. Zheng, "Bandera: Extracting Finite-State Models from Java Source Code," Proceedings of International Conference on Software Engineering (June 2000), pp. 439-448.
-
(2000)
Proceedings of International Conference on Software Engineering
, pp. 439-448
-
-
Corbett, J.C.1
Dwyer, M.2
Hatcliff, J.3
Pasareanu, C.4
Robby5
Laubach, S.6
Zheng, H.7
-
72
-
-
84894630000
-
Proceedings of 8th International SPIN Workshop of Model Checking of Software (SPIN 2001), in Lecture Notes in Computer Science
-
T. Ball and S. K. Rajamani, "Automatically Validating Temporal Safety Properties of Interfaces," Proceedings of 8th International SPIN Workshop of Model Checking of Software (SPIN 2001), in Lecture Notes in Computer Science 2057, 103-122 (2001).
-
(2001)
, vol.2057
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
74
-
-
0036040604
-
ACM SIG PLAN Notices 37, No. 5, 57-68 (May 2002), in Conference on Programming Language Design and Implementation (PLDI)
-
M. Das, S. Lerner, and M. Seigle, "ESP: Path-Sensitive Program Verification in Polynomial Time," ACM SIG PLAN Notices 37, No. 5, 57-68 (May 2002), in Conference on Programming Language Design and Implementation (PLDI).
-
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
75
-
-
23744483521
-
Software Validation via Scalable Path-Sensitive Value Flow Analysis
-
N. Dor, S. Adams, M. Das, and Z. Yang, "Software Validation via Scalable Path-Sensitive Value Flow Analysis," Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (2004), pp. 12-22, http://doi.acm.org/10.1145/1007515.
-
(2004)
Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis
, pp. 12-22
-
-
Dor, N.1
Adams, S.2
Das, M.3
Yang, Z.4
-
76
-
-
34247362881
-
Effective Typestate Verification in the Presence of Aliasing
-
S. Fink, E. Yahav, G. Ramalingam, N. Dor, and E. Geay, "Effective Typestate Verification in the Presence of Aliasing," Proceedings of the International Symposium on Software Testing and Analysis (2006), pp. 133-144.
-
(2006)
Proceedings of the International Symposium on Software Testing and Analysis
, pp. 133-144
-
-
Fink, S.1
Yahav, E.2
Ramalingam, G.3
Dor, N.4
Geay, E.5
-
77
-
-
35248866218
-
-
J. Field, D. Goyal, G. Ramalingam, and E. Yahav, Typestate Verification: Abstraction Techniques and Complexity Results, Proceedings of Static Analysis Symposium (SAS'03), in Lecture Notes in Computer Science 2694, 439-462 (June 2003).
-
J. Field, D. Goyal, G. Ramalingam, and E. Yahav, "Typestate Verification: Abstraction Techniques and Complexity Results," Proceedings of Static Analysis Symposium (SAS'03), in Lecture Notes in Computer Science 2694, 439-462 (June 2003).
-
-
-
-
78
-
-
0036037941
-
Deriving Specialized Program Analyses for Certifying Component-Client Conformance
-
New York: ACM Press June 17-19
-
G. Ramalingam, A. Warshavsky, J. Field, D. Goyal, and M. Sagiv, "Deriving Specialized Program Analyses for Certifying Component-Client Conformance," Proceedings of ACM Conference on Programming Language Design and Implementation, ACM SIGPLAN Notices 37, No. 5, 83-94, New York: ACM Press (June 17-19 2002).
-
(2002)
Proceedings of ACM Conference on Programming Language Design and Implementation, ACM SIGPLAN Notices
, vol.37
, Issue.5
, pp. 83-94
-
-
Ramalingam, G.1
Warshavsky, A.2
Field, J.3
Goyal, D.4
Sagiv, M.5
-
79
-
-
21144449292
-
Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management
-
R. Shaham, E. Yahav, E. Kolodner, and M. Sagiv, "Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management," Proceedings of Static Analysis Symposium (2003), pp. 483-503, http://link.springer.de/link/service/series/0558 /bibs/2694/26940483.htm.
-
(2003)
Proceedings of Static Analysis Symposium
, pp. 483-503
-
-
Shaham, R.1
Yahav, E.2
Kolodner, E.3
Sagiv, M.4
-
80
-
-
0034818448
-
Automatic Predicate Abstraction of C Programs
-
June
-
T. Ball, R. Majumdar, T. Millstein, and S. Rajamani, "Automatic Predicate Abstraction of C Programs," Proceedings of ACM Conference on Programming Language Design and Implementation (June 2001), pp. 203-213.
-
(2001)
Proceedings of ACM Conference on Programming Language Design and Implementation
, pp. 203-213
-
-
Ball, T.1
Majumdar, R.2
Millstein, T.3
Rajamani, S.4
-
81
-
-
0039488517
-
Parametric Shape Analysis via 3-Valued Logic
-
May
-
M. Sagiv, T. Reps, and R. Wilhelm, "Parametric Shape Analysis via 3-Valued Logic," Transactions on Programming Languages and Systems (TOPLAS) 24, No. 3, 217-298 (May 2002).
-
(2002)
Transactions on Programming Languages and Systems (TOPLAS)
, vol.24
, Issue.3
, pp. 217-298
-
-
Sagiv, M.1
Reps, T.2
Wilhelm, R.3
-
83
-
-
0036039066
-
The SLAM Project: Debugging System Software via Static Analysis
-
Jan
-
T. Ball and S. K. Rajamani, "The SLAM Project: Debugging System Software via Static Analysis," ACM SIGPLAN Notices 37, No. 1, pp. 1-3 (Jan. 2002).
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.1
, pp. 1-3
-
-
Ball, T.1
Rajamani, S.K.2
-
84
-
-
0036041563
-
Lazy Abstraction
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre, "Lazy Abstraction," Proceedings of ACM Symposium on Principles of Programming Languages (2002), pp. 58-70.
-
(2002)
Proceedings of ACM Symposium on Principles of Programming Languages
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
85
-
-
34250326521
-
18th European Conference on Object-Oriented Programming (ECOOP), in Lecture Notes in Computer Science
-
June
-
R. DeLine and M. Fähndrich, "Typestates for Objects," 18th European Conference on Object-Oriented Programming (ECOOP), in Lecture Notes in Computer Science 3086, (June 2004), 465-490.
-
(2004)
, vol.3086
, pp. 465-490
-
-
DeLine, R.1
Fähndrich, M.2
-
86
-
-
0036039550
-
ACM SIGPLAN Notices 37, No. 5, 13-24 (May 2002), in Conference on Programming Language Design and Implementation (PLDI)
-
M. Fähndrich and R. DeLine, "Adoption and Focus: Practical Linear Types for Imperative Programming," ACM SIGPLAN Notices 37, No. 5, 13-24 (May 2002), in Conference on Programming Language Design and Implementation (PLDI).
-
-
-
Fähndrich, M.1
DeLine, R.2
-
87
-
-
0018294932
-
Systematic Design of Program Analysis Frameworks
-
New York, NY, ACM Press
-
P. Cousot and R. Cousot, "Systematic Design of Program Analysis Frameworks," Proceedings of ACM Symposium on Principles of Programming Languages, New York, NY, ACM Press (1979), pp. 269-282.
-
(1979)
Proceedings of ACM Symposium on Principles of Programming Languages
, pp. 269-282
-
-
Cousot, P.1
Cousot, R.2
|