-
1
-
-
34948899197
-
-
R. Abreu, P. Zoeteweij, and A. J. C. van Gemund. Program spectra analysis in embedded systems: A case study. In 12th Ann. Conf. of the Advanced School for Computing and Imaging (ASCI'06). ASCI, June 2006.
-
R. Abreu, P. Zoeteweij, and A. J. C. van Gemund. Program spectra analysis in embedded systems: A case study. In 12th Ann. Conf. of the Advanced School for Computing and Imaging (ASCI'06). ASCI, June 2006.
-
-
-
-
3
-
-
35048827871
-
The blast query language for software verification
-
11th Intl. Static Analysis Symp, SAS 2004, of, Springer
-
D. Beyer, A. J. Chlipala, T. A. Henzinger, R. Jhala, and R. Majumdar. The blast query language for software verification.. In 11th Intl. Static Analysis Symp. (SAS 2004), volume 3148 of LNCS, pages 2-18. Springer, 2004.
-
(2004)
LNCS
, vol.3148
, pp. 2-18
-
-
Beyer, D.1
Chlipala, A.J.2
Henzinger, T.A.3
Jhala, R.4
Majumdar, R.5
-
4
-
-
0348018563
-
Interprocedural constant propagation using dependence graphs and a data-flow model
-
5th Intl. Conf. on Compiler Construction CC'94, of, Springer
-
D. Binkley. Interprocedural constant propagation using dependence graphs and a data-flow model. In 5th Intl. Conf. on Compiler Construction (CC'94), volume 786 of LNCS, pages 374-388. Springer, 1994.
-
(1994)
LNCS
, vol.786
, pp. 374-388
-
-
Binkley, D.1
-
5
-
-
33747804464
-
Demand-driven, symbolic range propagation
-
8th Intl. Workshop on Languages and Compilers for Parallel Computing, LCPC'95, of, Springer
-
W. Blume and R. Eigenmann. Demand-driven, symbolic range propagation. In 8th Intl. Workshop on Languages and Compilers for Parallel Computing, (LCPC'95), volume 1033 of LNCS, pages 141-160. Springer, 1995.
-
(1995)
LNCS
, vol.1033
, pp. 141-160
-
-
Blume, W.1
Eigenmann, R.2
-
6
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
W. R. Bush, J. D. Pincus, and D. J. Sielaff. A static analyzer for finding dynamic programming errors. Softw. Pract. Exp., 30(7):775-802, 2000.
-
(2000)
Softw. Pract. Exp
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.R.1
Pincus, J.D.2
Sielaff, D.J.3
-
7
-
-
3042666526
-
Modular verification of software components in C
-
S. Chaki, E. Clarke, A. Groce, S. Jha, and H. Veith. Modular verification of software components in C. IEEE Trans. Softw. Eng., 30(6):388-402, 2004.
-
(2004)
IEEE Trans. Softw. Eng
, vol.30
, Issue.6
, pp. 388-402
-
-
Chaki, S.1
Clarke, E.2
Groce, A.3
Jha, S.4
Veith, H.5
-
11
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
October
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In 4th Symp. on Operating Systems Design and Implementation, pages 1-16, October 2000.
-
(2000)
4th Symp. on Operating Systems Design and Implementation
, pp. 1-16
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
12
-
-
85011293817
-
LCLint: A tool for using specifications to check code
-
D. Evans, J. Guttag, J. Horning, and Y.M. Tan. LCLint: A tool for using specifications to check code. In 2nd ACM Symp. on the Foundations of Software Engineering, pages 87-96, 1994.
-
(1994)
2nd ACM Symp. on the Foundations of Software Engineering
, pp. 87-96
-
-
Evans, D.1
Guttag, J.2
Horning, J.3
Tan, Y.M.4
-
13
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Softw., 19(1):42-51, 2002.
-
(2002)
IEEE Softw
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
14
-
-
0017292244
-
Design and code inspections to reduce errors in program development
-
M. E. Fagan. Design and code inspections to reduce errors in program development. IBM Syst. Jour., 15(3):182-211, 1976.
-
(1976)
IBM Syst. Jour
, vol.15
, Issue.3
, pp. 182-211
-
-
Fagan, M.E.1
-
16
-
-
0036036098
-
Extended static checking for java
-
ACM
-
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata. Extended static checking for java. In ACM Conference on Programming language design and implementation (PLDI'02), pages 234-245. ACM, 2002.
-
(2002)
ACM Conference on Programming language design and implementation (PLDI'02)
, pp. 234-245
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
20
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
S. Horwitz, T. W. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. ACM Trans. Program. Lang. Syst., 12(1):26-60, 1990.
-
(1990)
ACM Trans. Program. Lang. Syst
, vol.12
, Issue.1
, pp. 26-60
-
-
Horwitz, S.1
Reps, T.W.2
Binkley, D.3
-
21
-
-
85084161650
-
Finding user/kernel pointer bugs with type inference
-
Aug
-
R. Johnson and D. Wagner. Finding user/kernel pointer bugs with type inference. In 13th Usenix Security Symp., pages 119-134, Aug. 2004.
-
(2004)
13th Usenix Security Symp
, pp. 119-134
-
-
Johnson, R.1
Wagner, D.2
-
22
-
-
0012529658
-
Lint, a C program checker
-
chapter 15, Bell Labs
-
S. C. Johnson. Lint, a C program checker. In Unix Programmer's Manual, volume 2A, chapter 15, pages 292-303. Bell Labs, 1978.
-
(1978)
Unix Programmer's Manual
, vol.2 A
, pp. 292-303
-
-
Johnson, S.C.1
-
23
-
-
23844477419
-
Constant propagation on the value graph: Simple constants and beyond
-
9th Intl. Conf. on Compiler Construction CC 2000, of, Springer
-
J. Knoop and O. Rüthing. Constant propagation on the value graph: Simple constants and beyond. In 9th Intl. Conf. on Compiler Construction (CC 2000), volume 1781 of LNCS, pages 94-109. Springer, 2000.
-
(2000)
LNCS
, vol.1781
, pp. 94-109
-
-
Knoop, J.1
Rüthing, O.2
-
24
-
-
35248882461
-
Z-ranking: Using Statistical analysis to counter the impact of static analysis approximations
-
10th Intl. Static Analysis Symp, SAS 2003, of, Springer
-
T. Kremenek and D. R. Engler. Z-ranking: Using Statistical analysis to counter the impact of static analysis approximations. In 10th Intl. Static Analysis Symp. (SAS 2003), volume 2694 of LNCS, pages 295-315. Springer, 2003.
-
(2003)
LNCS
, vol.2694
, pp. 295-315
-
-
Kremenek, T.1
Engler, D.R.2
-
26
-
-
0031599398
-
Understanding the sources of variation in software inspections
-
A. A. Porter, H. Siy, A. Mockus, and L.G. Votta. Understanding the sources of variation in software inspections. ACM Trans. Softw. Eng. Meth., 7(1):41-79, 1998.
-
(1998)
ACM Trans. Softw. Eng. Meth
, vol.7
, Issue.1
, pp. 41-79
-
-
Porter, A.A.1
Siy, H.2
Mockus, A.3
Votta, L.G.4
-
27
-
-
0025889224
-
Experience with inspection in ultralarge-scale developments
-
G. W. Russell. Experience with inspection in ultralarge-scale developments. IEEE Softw., 8(1):25-31, 1991.
-
(1991)
IEEE Softw
, vol.8
, Issue.1
, pp. 25-31
-
-
Russell, G.W.1
-
28
-
-
84957653937
-
Precise interprocedural dataflow analysis with applications to constant propagation
-
6th Intl. Conf. on Theory and Practice of Software Development TAPSOFT'95, of, Springer
-
S. Sagiv, T. W. Reps, and S. Horwitz. Precise interprocedural dataflow analysis with applications to constant propagation. In 6th Intl. Conf. on Theory and Practice of Software Development (TAPSOFT'95), volume 915 of LNCS, pages 651-665. Springer, 1995.
-
(1995)
LNCS
, vol.915
, pp. 651-665
-
-
Sagiv, S.1
Reps, T.W.2
Horwitz, S.3
-
31
-
-
84905030599
-
-
C. Verbrugge, P. Co, and L.J. Hendren. Generalized constant propagation: A study in C. In 6th Intl. Conf. on Compiler Construction (CC'96), 1060 of LNCS, pages 74-90. Springer, 1996.
-
C. Verbrugge, P. Co, and L.J. Hendren. Generalized constant propagation: A study in C. In 6th Intl. Conf. on Compiler Construction (CC'96), volume 1060 of LNCS, pages 74-90. Springer, 1996.
-
-
-
-
33
-
-
0029306012
-
Software testability: The new verification
-
J.M. Voas and K.W. Miller. Software testability: The new verification. IEEE Softw., pages 17-28, 1995.
-
(1995)
IEEE Softw
, pp. 17-28
-
-
Voas, J.M.1
Miller, K.W.2
-
34
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Feb
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symp., pages 3-17, Feb. 2000.
-
(2000)
Network and Distributed System Security Symp
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
35
-
-
0028055433
-
Accurate static estimators for program optimization
-
T. A. Wagner, V. Maverick, S. L. Graham, and M. A. Harrison. Accurate static estimators for program optimization. In ACM Conf. on Programming Language Design and Implementation (PLDV94), pages 85-96, 1994.
-
(1994)
ACM Conf. on Programming Language Design and Implementation (PLDV94)
, pp. 85-96
-
-
Wagner, T.A.1
Maverick, V.2
Graham, S.L.3
Harrison, M.A.4
-
38
-
-
34948896363
-
-
D. A. Wheeler, B. Brykczynski, and Jr. R. N. Meeson, editors. Software Inspection : An Industry Best Practice. IEEE, 1996.
-
D. A. Wheeler, B. Brykczynski, and Jr. R. N. Meeson, editors. Software Inspection : An Industry Best Practice. IEEE, 1996.
-
-
-
-
39
-
-
84948452093
-
Software inspection benchmarking - a qualitative and quantitative comparative opportunity
-
IEEE
-
C. Wohlin, A. Aurum, H. Petersson, F. Shull, and M. Ciolkowski. Software inspection benchmarking - a qualitative and quantitative comparative opportunity. In 8th Intl. Software Metrics Symp. (METRICS 2002). IEEE, 2002.
-
(2002)
8th Intl. Software Metrics Symp. (METRICS 2002)
-
-
Wohlin, C.1
Aurum, A.2
Petersson, H.3
Shull, F.4
Ciolkowski, M.5
-
40
-
-
0028768030
-
Static branch frequency and program profile analysis
-
ACM/IEEE
-
Y. Wu and J. R. Larus. Static branch frequency and program profile analysis. In 27th Ann. Intl. Symp. on Microarchitecture, pages 1-11. ACM/IEEE, 1994.
-
(1994)
27th Ann. Intl. Symp. on Microarchitecture
, pp. 1-11
-
-
Wu, Y.1
Larus, J.R.2
-
41
-
-
14844302134
-
MECA: An extensible, expressive system and language for statically checking security properties
-
J. Yang, T. Kremenek, Y. Xie, and D. Engler. MECA: an extensible, expressive system and language for statically checking security properties. In 10th ACM Conf. on Computer and Communications Security, 2003.
-
(2003)
10th ACM Conf. on Computer and Communications Security
-
-
Yang, J.1
Kremenek, T.2
Xie, Y.3
Engler, D.4
|