-
1
-
-
0034837177
-
A framework for reducing the cost of instrumented code
-
May, ACM, pp
-
ARNOLD, M., AND RYDER, B. G. A framework for reducing the cost of instrumented code. In Proc. PLDI (May 2001), ACM, pp. 168-179.
-
(2001)
Proc. PLDI
, pp. 168-179
-
-
ARNOLD, M.1
RYDER, B.G.2
-
2
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
BUSH, W., PINCUS, J. D., AND SIELAFF, D. J. A static analyzer for finding dynamic programming errors. Software-Practice and Experience 30, 7 (2000), 775-802.
-
(2000)
Software-Practice and Experience
, vol.30
, Issue.7
, pp. 775-802
-
-
BUSH, W.1
PINCUS, J.D.2
SIELAFF, D.J.3
-
3
-
-
12844277166
-
Low-overhead memory leak detection using adaptive statistical profiling
-
October, ACM, pp
-
CHILIMBI, T. M., AND HAUSWIRTH, M. Low-overhead memory leak detection using adaptive statistical profiling. In Proc. ASPLOS (October 2004), ACM, pp. 156-164.
-
(2004)
Proc. ASPLOS
, pp. 156-164
-
-
CHILIMBI, T.M.1
HAUSWIRTH, M.2
-
4
-
-
0036039949
-
Role-based exploration of object-oriented programs
-
May, IEEE/ACM, pp
-
DEMSKY, B., AND RINARDI M. Role-based exploration of object-oriented programs. In Proc. ICSE (May 2002), IEEE/ACM, pp. 313-334.
-
(2002)
Proc. ICSE
, pp. 313-334
-
-
DEMSKY, B.1
RINARDI, M.2
-
5
-
-
1442288535
-
Automatic detection and repair of errors in data structures
-
October, ACM, pp
-
DEMSKY, B., AND RINARD, M. Automatic detection and repair of errors in data structures. In Proc. OOPSLA (October 2003), ACM, pp. 78-95.
-
(2003)
Proc. OOPSLA
, pp. 78-95
-
-
DEMSKY, B.1
RINARD, M.2
-
6
-
-
0038716440
-
Predicting whole-program locality with reuse distance analysis
-
June, ACM, pp
-
DING, C., AND ZHONG, Y. Predicting whole-program locality with reuse distance analysis. In Proc. PLDI (June 2003), ACM, pp. 245-257.
-
(2003)
Proc. PLDI
, pp. 245-257
-
-
DING, C.1
ZHONG, Y.2
-
7
-
-
0004349103
-
Vulcan: Binary transformation in. a distributed environment
-
Tech. Rep. 2001-50, Microsoft Research, April
-
EDWARDS, A., SRIVASTAVA, A., AND VO, H. Vulcan: Binary transformation in. a distributed environment. Tech. Rep. 2001-50, Microsoft Research, April 2001.
-
(2001)
-
-
EDWARDS, A.1
SRIVASTAVA, A.2
VO, H.3
-
8
-
-
33846171541
-
-
Discovering Likely Program Invariants. PhD thesis, University of Washington, Seattle, WA, August
-
ERNST, M. D. Dynamically Discovering Likely Program Invariants. PhD thesis, University of Washington, Seattle, WA, August 2000.
-
(2000)
Dynamically
-
-
ERNST, M.D.1
-
9
-
-
0029719687
-
-
GHIYA, R., AND HENDREN, L. Is it a Tree, a DAG or a Cyclic Graph? A shape analysis for heap-directed pointers in C. In Proc. POPL (January .1996), ACM, pp. 1-15.
-
GHIYA, R., AND HENDREN, L. Is it a Tree, a DAG or a Cyclic Graph? A shape analysis for heap-directed pointers in C. In Proc. POPL (January .1996), ACM, pp. 1-15.
-
-
-
-
10
-
-
29144444097
-
Region-based shape analysis with tracked locations
-
January, ACM, pp
-
HACKETT, B., AND RUGINA, R. Region-based shape analysis with tracked locations. In Proc. POPL (January 2005), ACM, pp. 310-323.
-
(2005)
Proc. POPL
, pp. 310-323
-
-
HACKETT, B.1
RUGINA, R.2
-
11
-
-
0036038345
-
Tracking down software bugs using automatic anomaly detection
-
May, IEEE/ACM, pp
-
HANGAL, S., AND LAM, M. S. Tracking down software bugs using automatic anomaly detection. In Proc. ICSE (May 2002), IEEE/ACM, pp. 291-301.
-
(2002)
Proc. ICSE
, pp. 291-301
-
-
HANGAL, S.1
LAM, M.S.2
-
12
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
January
-
HASTINGS, R., AND JOYCE, B. Purify: Fast detection of memory leaks and access errors. In Winter USENIX Conference (January 1992).
-
(1992)
Winter USENIX Conference
-
-
HASTINGS, R.1
JOYCE, B.2
-
14
-
-
1442264406
-
Understanding the connectivity of heap objects
-
June, ACM, pp
-
HIRZEL, M., HENKEL, J., DIWAN, A., AND HIND, M. Understanding the connectivity of heap objects. In Proc. ISMM (June 2002), ACM, pp. 143-156.
-
(2002)
Proc. ISMM
, pp. 143-156
-
-
HIRZEL, M.1
HENKEL, J.2
DIWAN, A.3
HIND, M.4
-
15
-
-
20344404753
-
Correlation exploitation in error ranking
-
November, ACM, pp
-
KREMENEK, T., ASHCRAFT, K., YANG, J., AND ENGLER, D. Correlation exploitation in error ranking. In Proc. SIGSOFT FSE (November 2004), ACM, pp. 83-93.
-
(2004)
Proc. SIGSOFT FSE
, pp. 83-93
-
-
KREMENEK, T.1
ASHCRAFT, K.2
YANG, J.3
ENGLER, D.4
-
16
-
-
35248882461
-
-
KREMENEK, T., AND ENGLER, D. Z-Ranking: Using statistical analysis to counter the impact of static analysis approximations. In Proc. Intl. Static Analysis Symp. (SAS) (June 2003), pp. 295-315.
-
KREMENEK, T., AND ENGLER, D. Z-Ranking: Using statistical analysis to counter the impact of static analysis approximations. In Proc. Intl. Static Analysis Symp. (SAS) (June 2003), pp. 295-315.
-
-
-
-
17
-
-
84910009447
-
Cp-miner: A tool for finding copy-paste and related bugs in operating system code
-
Dec., ACM/USENIX, pp
-
LI, Z., LU, S., MYAGMAR, S., AND ZHOU, Y. Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In Proc. OSDI (Dec. 2004), ACM/USENIX, pp. 289-302.
-
(2004)
Proc. OSDI
, pp. 289-302
-
-
LI, Z.1
LU, S.2
MYAGMAR, S.3
ZHOU, Y.4
-
18
-
-
0038716503
-
Bug isolation via remote program, sampling
-
June, ACM, pp
-
LIBLIT, B., AIKEN, A., ZHENG, A. X., AND JORDAN, M. I. Bug isolation via remote program, sampling. In Proc. PLDI (June 2003), ACM, pp. 141-154.
-
(2003)
Proc. PLDI
, pp. 141-154
-
-
LIBLIT, B.1
AIKEN, A.2
ZHENG, A.X.3
JORDAN, M.I.4
-
20
-
-
33846494375
-
Verifying properties of well-founed linked lists
-
Jan., ACM
-
QADEER, S., AND LAHIRI, S. Verifying properties of well-founed linked lists. In Proc. POPL (Jan. 2006), ACM.
-
(2006)
Proc. POPL
-
-
QADEER, S.1
LAHIRI, S.2
-
21
-
-
84885578759
-
Treating bugs as allergies - a safe method to survive software failures
-
Oct, ACM, pp
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: Treating bugs as allergies - a safe method to survive software failures. In Proc. SOSP (Oct 2005), ACM, pp. 235-248.
-
(2005)
Proc. SOSP
, pp. 235-248
-
-
QIN, F.1
TUCEK, J.2
SUNDARESAN, J.3
ZHOU, Y.R.4
-
22
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
December
-
RLNARD, M., CADAR, C., DUMITRAN, D., ROY, D., LEU, T., AND BEEBEE, W. Enhancing server availability and security through failure-oblivious computing. In Proc. OSDI (December 2004), pp. 303-316.
-
(2004)
Proc. OSDI
, pp. 303-316
-
-
RLNARD, M.1
CADAR, C.2
DUMITRAN, D.3
ROY, D.4
LEU, T.5
BEEBEE, W.6
-
23
-
-
0036040711
-
An efficient profile-analysis framework for data-layout optimizations
-
January, ACM, pp
-
RUBIN, S., BODIK, R., AND CHILIMBI, T. M. An efficient profile-analysis framework for data-layout optimizations. In Proc. POPL (January 2002), ACM, pp. 140-153.
-
(2002)
Proc. POPL
, pp. 140-153
-
-
RUBIN, S.1
BODIK, R.2
CHILIMBI, T.M.3
-
24
-
-
0039488517
-
Parametric shape analysis via 3-valued logic
-
May
-
SAGIV, M., REPS, T. W., AND WILHELM, R. Parametric shape analysis via 3-valued logic. ACM TOPLAS 24, 3 (May 2002), 217-298.
-
(2002)
ACM TOPLAS
, vol.24
, Issue.3
, pp. 217-298
-
-
SAGIV, M.1
REPS, T.W.2
WILHELM, R.3
-
25
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
May, IEEE, pp
-
SEKAR, R., BENDRE, M., DHURJATI, D., AND BOLLINENI, P. A fast automaton-based method for detecting anomalous program behaviors. In Symp. on Security and Privacy (May 2001), IEEE, pp. 144-155.
-
(2001)
Symp. on Security and Privacy
, pp. 144-155
-
-
SEKAR, R.1
BENDRE, M.2
DHURJATI, D.3
BOLLINENI, P.4
-
26
-
-
12844275862
-
Locality phase prediction
-
October, ACM, pp
-
SHEN, X., ZHONG, Y., AND DING, C. Locality phase prediction. In Proc. ASPLOS (October 2004), ACM, pp. 165-176.
-
(2004)
Proc. ASPLOS
, pp. 165-176
-
-
SHEN, X.1
ZHONG, Y.2
DING, C.3
-
27
-
-
0036953769
-
Automatically characterizing large scale program, behaviour
-
October, ACM, pp
-
SHERWOOD, T., PERELMAN, E., HAMERLY, G., AND CALDER, B. Automatically characterizing large scale program, behaviour. In Proc. ASPLOS (October 2002), ACM, pp. 45-57.
-
(2002)
Proc. ASPLOS
, pp. 45-57
-
-
SHERWOOD, T.1
PERELMAN, E.2
HAMERLY, G.3
CALDER, B.4
-
28
-
-
1342298848
-
Phase tracking and prediction
-
June
-
SHERWOOD, T., SAIR, S., AND CALDER, B. Phase tracking and prediction. In Proc. ISCA (June 2003), pp. 288-299.
-
(2003)
Proc. ISCA
, pp. 288-299
-
-
SHERWOOD, T.1
SAIR, S.2
CALDER, B.3
-
29
-
-
0034836394
-
Intrusion detection via static analysis
-
May, IEEE, pp
-
WAGNER, D., AND DEAN, D. Intrusion detection via static analysis. In Symp. on Security and Privacy (May 2001), IEEE, pp. 156-169.
-
(2001)
Symp. on Security and Privacy
, pp. 156-169
-
-
WAGNER, D.1
DEAN, D.2
-
30
-
-
8344280849
-
Verifying safety properties using separation, and heterogenous abstractions
-
June, ACM, pp
-
YAHAV, E., AND RAMALINGAM, G. Verifying safety properties using separation, and heterogenous abstractions. In Proc. PLDI (June 2004), ACM, pp. 25-34.
-
(2004)
Proc. PLDI
, pp. 25-34
-
-
YAHAV, E.1
RAMALINGAM, G.2
-
31
-
-
21644447484
-
AccMon: Automatically detecting memory-related bugs via program counter-based invariants
-
December, IEEE/ACM, pp
-
ZHOU, P., LIU, W., LONG, F., LU, S., QIN, F., ZHOU, Y., MIDKIFF, S., AND TORRELLAS, J. AccMon: Automatically detecting memory-related bugs via program counter-based invariants. In Proc. MICRO (December 2004), IEEE/ACM, pp. 269-280.
-
(2004)
Proc. MICRO
, pp. 269-280
-
-
ZHOU, P.1
LIU, W.2
LONG, F.3
LU, S.4
QIN, F.5
ZHOU, Y.6
MIDKIFF, S.7
TORRELLAS, J.8
|