-
1
-
-
70350760682
-
The SLAM Toolkit
-
Proc. CAV'01
-
T. Ball and S. Rajamani. "The SLAM Toolkit". In Proc. CAV'01, volume 2102 of LNCS, pages 260-264, 2001.
-
(2001)
LNCS
, vol.2102
, pp. 260-264
-
-
Ball, T.1
Rajamani, S.2
-
3
-
-
84944406286
-
Counterexample-Guided Abstraction Refinement
-
Proc. CAV'00
-
E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. " Counterexample-Guided Abstraction Refinement". In Proc. CAV'00, volume 1855 of LNCS, pages 154-169, 2000.
-
(2000)
LNCS
, vol.1855
, pp. 154-169
-
-
Clarke, E.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
4
-
-
35048861896
-
A Tool for Checking ANSI-C Programs
-
Proc. TACAS'04
-
E. Clarke, D. Kroening, and F. Lerda. "A Tool for Checking ANSI-C Programs". In Proc. TACAS'04, volume 2988 of LNCS, pages 168-176, 2004.
-
(2004)
LNCS
, vol.2988
, pp. 168-176
-
-
Clarke, E.1
Kroening, D.2
Lerda, F.3
-
5
-
-
24644505403
-
SATABS: SAT-based Predicate Abstraction for ANSI-C
-
Proc. TACAS'05
-
E. Clarke, D. Kroening, N. Sharygina, and K. Yorav. " SATABS: SAT-based Predicate Abstraction for ANSI-C ". In Proc. TACAS'05, volume 3440 of LNCS, pages 570-574, 2005.
-
(2005)
LNCS
, vol.3440
, pp. 570-574
-
-
Clarke, E.1
Kroening, D.2
Sharygina, N.3
Yorav, K.4
-
6
-
-
77953991091
-
-
CVE - Common Vulnerabilities and Exposures. http://cve.mitre.org/.
-
-
-
-
7
-
-
84947441305
-
Construction of Abstract State Graphs with PVS
-
Proc. CAV'97
-
S. Graf and H. Saïdi. "Construction of Abstract State Graphs with PVS". In Proc. CAV'97, volume 1254 of LNCS, pages 72-83, 1997.
-
(1997)
LNCS
, vol.1254
, pp. 72-83
-
-
Graf, S.1
Saïdi, H.2
-
8
-
-
34247099396
-
Modular Checking for Buffer Overflows in the Large
-
B. Hackett, M. Das, D. Wang, and Z. Yang. "Modular Checking for Buffer Overflows in the Large". In Proc. ICSE'06, pages 232-241, 2006.
-
(2006)
Proc. ICSE'06
, pp. 232-241
-
-
Hackett, B.1
Das, M.2
Wang, D.3
Yang, Z.4
-
9
-
-
0036041563
-
Lazy Abstraction
-
T. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. "Lazy Abstraction". In Proc. POPL'02, pages 58-70, 2002.
-
(2002)
Proc. POPL'02
, pp. 58-70
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
10
-
-
38149012113
-
Array Abstractions from Proofs
-
Proc. CAV'07, Springer
-
R. Jhala and K. McMillan. "Array Abstractions from Proofs". In Proc. CAV'07, volume 4590 of LNCS. Springer, 2007.
-
(2007)
LNCS
, vol.4590
-
-
Jhala, R.1
McMillan, K.2
-
11
-
-
56349108350
-
Using a Diagnostic Corpus of C Programs to Evaluate Buffer Overflow Detection by Static Analysis Tools
-
K. Kratkiewicz and R. Lippmann. "Using a Diagnostic Corpus of C Programs to Evaluate Buffer Overflow Detection by Static Analysis Tools". In Proc. BUGS'05, 2005.
-
Proc. BUGS'05, 2005
-
-
Kratkiewicz, K.1
Lippmann, R.2
-
12
-
-
35048849502
-
Counterexample Guided Abstraction Refinement via Program Execution
-
Proc. Int. Conf. on Formal Eng. Methods (ICFEM'04)
-
D. Kroening, A. Groce, and E. Clarke. "Counterexample Guided Abstraction Refinement via Program Execution". In Proc. Int. Conf. on Formal Eng. Methods (ICFEM'04), volume 3308 of LNCS, pages 224-238, 2004.
-
(2004)
LNCS
, vol.3308
, pp. 224-238
-
-
Kroening, D.1
Groce, A.2
Clarke, E.3
-
13
-
-
33749870840
-
Counterexamples with Loops for Predicate Abstraction
-
Proc. CAV'06
-
D. Kroening and G. Weissenbacher. "Counterexamples with Loops for Predicate Abstraction". In Proc. CAV'06, volume 4144 of LNCS, pages 152-165, 2006.
-
(2006)
LNCS
, vol.4144
, pp. 152-165
-
-
Kroening, D.1
Weissenbacher, G.2
-
14
-
-
0037384036
-
Model Checking Programs
-
April
-
W. Visser, K. Havelund, G. Brat, S. Park, and F. Lerda. "Model Checking Programs". Journal of Automated Software Engineering, 10(2), April 2003.
-
(2003)
Journal of Automated Software Engineering
, vol.10
, Issue.2
-
-
Visser, W.1
Havelund, K.2
Brat, G.3
Park, S.4
Lerda, F.5
-
15
-
-
0002946830
-
A First Step towards Automated Detection of Buffer Overrun Vulnerabilities
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. "A First Step towards Automated Detection of Buffer Overrun Vulnerabilities". In Proc. NDSS'00, pages 3-17, 2000.
-
(2000)
Proc. NDSS'00
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
17
-
-
1542317050
-
ARCHER: Using Symbolic, Path-Sensitive Analysis to Detect Memory Access Errors
-
Y. Xie, A. Chou, and D. R. Engler. "ARCHER: Using Symbolic, Path-Sensitive Analysis to Detect Memory Access Errors". In Proc. ESEC/FSE-11, pages 327-336, 2003.
-
(2003)
Proc. ESEC/FSE-11
, pp. 327-336
-
-
Xie, Y.1
Chou, A.2
Engler, D.R.3
-
18
-
-
20344363200
-
Testing Static Analysis Tools Using Exploitable Buffer Overflows from Open Source Code
-
M. Zitser, R. Lippmann, and T. Leek. "Testing Static Analysis Tools Using Exploitable Buffer Overflows from Open Source Code". In Proc. SIGSOFT'04/FSE-12, pages 97-106, 2004.
-
(2004)
Proc. SIGSOFT'04/FSE-12
, pp. 97-106
-
-
Zitser, M.1
Lippmann, R.2
Leek, T.3
|