-
1
-
-
0036039066
-
The SLAM project: Debugging system software via static analysis
-
January
-
T. Ball and S. K. Rajamani. The SLAM project: Debugging system software via static analysis. In Proc. of the Symp. on Princ. of Prog. Lang., pages 1-3, January 2002.
-
(2002)
Proc. of the Symp. on Princ. of Prog. Lang
, pp. 1-3
-
-
Ball, T.1
Rajamani, S.K.2
-
2
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA 01730. March
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA 01730. March 1976.
-
(1976)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
4
-
-
56349148578
-
-
T. Christiansen. Perl security. http://www.perl.com/doc/manual/html/pod/ perlsec.html Taint module available November 1997.
-
T. Christiansen. Perl security. http://www.perl.com/doc/manual/html/pod/ perlsec.html Taint module available November 1997.
-
-
-
-
6
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
451-490. October
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM Trans. on Program. Lang. and Syst., 13(4):451-490. October 1991.
-
(1991)
ACM Trans. on Program. Lang. and Syst
, vol.13
, Issue.4
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1997.
-
(1997)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
56349157743
-
-
A. Deutsch. Static verification of dynamic properties. PolySpace White Paper
-
A. Deutsch. Static verification of dynamic properties. PolySpace White Paper.
-
-
-
-
10
-
-
84975277890
-
Checking system rules using system-specific programmer-written compiler extensions
-
Oct
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific programmer-written compiler extensions. In Proc. of the Symp. on Operat. Syst. Design and Impl., pages 23-25, Oct. 2000.
-
(2000)
Proc. of the Symp. on Operat. Syst. Design and Impl
, pp. 23-25
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
11
-
-
0023385308
-
The program dependence graph and its use in optimization
-
319-349, Jul
-
J. Ferrante, K. J. Ottenstein, and J. D. Warren. The program dependence graph and its use in optimization. ACM Trans. on Prog. Lang. and Syst., 9(3):319-349, Jul. 1987.
-
(1987)
ACM Trans. on Prog. Lang. and Syst
, vol.9
, Issue.3
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
14
-
-
34247186927
-
Un-kleene boolean equation solver
-
B. Herlihy, P. Schachte, and H. Sondergaard. Un-kleene boolean equation solver. International Journal on Foundations of Computer Science, 18(2):227-250, 2007.
-
(2007)
International Journal on Foundations of Computer Science
, vol.18
, Issue.2
, pp. 227-250
-
-
Herlihy, B.1
Schachte, P.2
Sondergaard, H.3
-
15
-
-
0003620778
-
-
Addison-Wesley, 2 edition
-
J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2 edition, 2000.
-
(2000)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
16
-
-
84976706502
-
Global data flow analysis and iterative algorithms
-
J. B. Kam and J. D. Ullman. Global data flow analysis and iterative algorithms. J. ACM, 23(1): 158-171, 1976.
-
(1976)
J. ACM
, vol.23
, Issue.1
, pp. 158-171
-
-
Kam, J.B.1
Ullman, J.D.2
-
18
-
-
0742276097
-
Inside the Slammer Worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Stamford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Stamford, S.5
Weaver, N.6
-
19
-
-
84963624364
-
The program dependence web: A representation supporting control-, data-, and demand-driven interpretation of imperative languages
-
K. J. Ottenstein, R. A. Ballance, and A. B. MacCabe. The program dependence web: a representation supporting control-, data-, and demand-driven interpretation of imperative languages. In Proc. of the conf. on Prog. Lang. Design and Impl., pages 257-271, 1990.
-
(1990)
Proc. of the conf. on Prog. Lang. Design and Impl
, pp. 257-271
-
-
Ottenstein, K.J.1
Ballance, R.A.2
MacCabe, A.B.3
-
20
-
-
26444502057
-
Interprocedural analysis for privileged code placement and tainted variable detection
-
July
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural analysis for privileged code placement and tainted variable detection. In Proc. of the European Conf. on Object-Oriented Prog., pages 362-386, July 2005.
-
(2005)
Proc. of the European Conf. on Object-Oriented Prog
, pp. 362-386
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
23
-
-
56349131084
-
User-input dependence analysis via graph reachability
-
TR-2008-171, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March
-
B. Scholz, C. Zhang, and C. Cifuentes. User-input dependence analysis via graph reachability. Technical Report SMLl TR-2008-171, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March 2008.
-
(2008)
Technical Report SMLl
-
-
Scholz, B.1
Zhang, C.2
Cifuentes, C.3
-
24
-
-
33750912954
-
Efficient path conditions in dependence graphs for software safety analysis
-
410-457, October
-
G. Snelting, T. Robschink, and J. Krinke. Efficient path conditions in dependence graphs for software safety analysis. ACM Trans. on Softw. Eng. and Meth., 15(4):410-457, October 2006.
-
(2006)
ACM Trans. on Softw. Eng. and Meth
, vol.15
, Issue.4
-
-
Snelting, G.1
Robschink, T.2
Krinke, J.3
-
25
-
-
0019587817
-
Fast algorithms for solving path problems
-
July
-
R. E. Tarjan. Fast algorithms for solving path problems. Journal of the ACM, 28(3):594-614, July 1981.
-
(1981)
Journal of the ACM
, vol.28
, Issue.3
, pp. 594-614
-
-
Tarjan, R.E.1
-
26
-
-
0000990322
-
A survey of program slicing techniques
-
September
-
F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3):121-189, September 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, F.1
-
28
-
-
56349141382
-
-
US-CERT. Vulnerability Note VU#881872, Sun Solaris telnet authentication bypass vulnerability. http://www.kb.cert.org/vuls/id/881872.
-
US-CERT. Vulnerability Note VU#881872, Sun Solaris telnet authentication bypass vulnerability. http://www.kb.cert.org/vuls/id/881872.
-
-
-
-
30
-
-
0026873896
-
The transitive closure of control dependence: The iterated join
-
M. Weiss. The transitive closure of control dependence: the iterated join. ACM Lett. Program. Lang. Syst., 1(2): 178-190, 1992.
-
(1992)
ACM Lett. Program. Lang. Syst
, vol.1
, Issue.2
, pp. 178-190
-
-
Weiss, M.1
|