메뉴 건너뛰기




Volumn , Issue , 2008, Pages 25-34

User-input dependence analysis via graph reachability

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); PROGRAM DEBUGGING;

EID: 56349145159     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCAM.2008.22     Document Type: Conference Paper
Times cited : (27)

References (30)
  • 1
    • 0036039066 scopus 로고    scopus 로고
    • The SLAM project: Debugging system software via static analysis
    • January
    • T. Ball and S. K. Rajamani. The SLAM project: Debugging system software via static analysis. In Proc. of the Symp. on Princ. of Prog. Lang., pages 1-3, January 2002.
    • (2002) Proc. of the Symp. on Princ. of Prog. Lang , pp. 1-3
    • Ball, T.1    Rajamani, S.K.2
  • 2
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA 01730. March
    • D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA 01730. March 1976.
    • (1976)
    • Bell, D.E.1    LaPadula, L.J.2
  • 4
    • 56349148578 scopus 로고    scopus 로고
    • T. Christiansen. Perl security. http://www.perl.com/doc/manual/html/pod/ perlsec.html Taint module available November 1997.
    • T. Christiansen. Perl security. http://www.perl.com/doc/manual/html/pod/ perlsec.html Taint module available November 1997.
  • 8
    • 0017517624 scopus 로고    scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1997.
    • (1997) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 9
    • 56349157743 scopus 로고    scopus 로고
    • A. Deutsch. Static verification of dynamic properties. PolySpace White Paper
    • A. Deutsch. Static verification of dynamic properties. PolySpace White Paper.
  • 16
    • 84976706502 scopus 로고
    • Global data flow analysis and iterative algorithms
    • J. B. Kam and J. D. Ullman. Global data flow analysis and iterative algorithms. J. ACM, 23(1): 158-171, 1976.
    • (1976) J. ACM , vol.23 , Issue.1 , pp. 158-171
    • Kam, J.B.1    Ullman, J.D.2
  • 19
    • 84963624364 scopus 로고
    • The program dependence web: A representation supporting control-, data-, and demand-driven interpretation of imperative languages
    • K. J. Ottenstein, R. A. Ballance, and A. B. MacCabe. The program dependence web: a representation supporting control-, data-, and demand-driven interpretation of imperative languages. In Proc. of the conf. on Prog. Lang. Design and Impl., pages 257-271, 1990.
    • (1990) Proc. of the conf. on Prog. Lang. Design and Impl , pp. 257-271
    • Ottenstein, K.J.1    Ballance, R.A.2    MacCabe, A.B.3
  • 23
    • 56349131084 scopus 로고    scopus 로고
    • User-input dependence analysis via graph reachability
    • TR-2008-171, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March
    • B. Scholz, C. Zhang, and C. Cifuentes. User-input dependence analysis via graph reachability. Technical Report SMLl TR-2008-171, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March 2008.
    • (2008) Technical Report SMLl
    • Scholz, B.1    Zhang, C.2    Cifuentes, C.3
  • 24
    • 33750912954 scopus 로고    scopus 로고
    • Efficient path conditions in dependence graphs for software safety analysis
    • 410-457, October
    • G. Snelting, T. Robschink, and J. Krinke. Efficient path conditions in dependence graphs for software safety analysis. ACM Trans. on Softw. Eng. and Meth., 15(4):410-457, October 2006.
    • (2006) ACM Trans. on Softw. Eng. and Meth , vol.15 , Issue.4
    • Snelting, G.1    Robschink, T.2    Krinke, J.3
  • 25
    • 0019587817 scopus 로고
    • Fast algorithms for solving path problems
    • July
    • R. E. Tarjan. Fast algorithms for solving path problems. Journal of the ACM, 28(3):594-614, July 1981.
    • (1981) Journal of the ACM , vol.28 , Issue.3 , pp. 594-614
    • Tarjan, R.E.1
  • 26
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • September
    • F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3):121-189, September 1995.
    • (1995) Journal of Programming Languages , vol.3 , Issue.3 , pp. 121-189
    • Tip, F.1
  • 28
    • 56349141382 scopus 로고    scopus 로고
    • US-CERT. Vulnerability Note VU#881872, Sun Solaris telnet authentication bypass vulnerability. http://www.kb.cert.org/vuls/id/881872.
    • US-CERT. Vulnerability Note VU#881872, Sun Solaris telnet authentication bypass vulnerability. http://www.kb.cert.org/vuls/id/881872.
  • 30
    • 0026873896 scopus 로고
    • The transitive closure of control dependence: The iterated join
    • M. Weiss. The transitive closure of control dependence: the iterated join. ACM Lett. Program. Lang. Syst., 1(2): 178-190, 1992.
    • (1992) ACM Lett. Program. Lang. Syst , vol.1 , Issue.2 , pp. 178-190
    • Weiss, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.