-
1
-
-
34250656241
-
-
C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (Charleston, South Carolina, January 09-10, 2006). PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
-
C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (Charleston, South Carolina, January 09-10, 2006). PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
-
-
-
-
2
-
-
0025448361
-
Dynamic program slicing
-
Agrawal H., and Horgan J. Dynamic program slicing. SIGPLAN Notices 25 6 (1990) 246-256
-
(1990)
SIGPLAN Notices
, vol.25
, Issue.6
, pp. 246-256
-
-
Agrawal, H.1
Horgan, J.2
-
3
-
-
0027884535
-
-
H. Agrawal, J. Horgan, E. Krauser, S. London, Incremental regression testing, in: Proceedings of the IEEE Conference on Software Maintenance, Montreal, Canada, 1993.
-
H. Agrawal, J. Horgan, E. Krauser, S. London, Incremental regression testing, in: Proceedings of the IEEE Conference on Software Maintenance, Montreal, Canada, 1993.
-
-
-
-
4
-
-
0035784225
-
-
A. Beszedes, T. Gergely, Z.M. Szabó, J. Csirik, T. Gyimothy, Dynamic slicing method for maintenance of large C programs, in: 5th European Conference on Software Maintenance and Re-engineering, Lisbon, Portugal, March 2001.
-
A. Beszedes, T. Gergely, Z.M. Szabó, J. Csirik, T. Gyimothy, Dynamic slicing method for maintenance of large C programs, in: 5th European Conference on Software Maintenance and Re-engineering, Lisbon, Portugal, March 2001.
-
-
-
-
6
-
-
34548212308
-
-
J. Clause, W., Li, A. Orso, Dytan: a generic dynamic taint analysis framework, in: International Symposium on Software Testing and Analysis 2007 (ISSTA 2007).
-
J. Clause, W., Li, A. Orso, Dytan: a generic dynamic taint analysis framework, in: International Symposium on Software Testing and Analysis 2007 (ISSTA 2007).
-
-
-
-
7
-
-
85129474555
-
-
W. Cheng, Q. Zhao, B. Yu, S. Hiroshige, TaintTrace: efficient flow tracing with dynamic binary rewriting, in: Proceedings of the 11th IEEE Symposium on Computers and Communications, 2006.
-
W. Cheng, Q. Zhao, B. Yu, S. Hiroshige, TaintTrace: efficient flow tracing with dynamic binary rewriting, in: Proceedings of the 11th IEEE Symposium on Computers and Communications, 2006.
-
-
-
-
8
-
-
21644482450
-
-
J.R. Crandall, F.T. Chong, Minos: control data attack prevention orthogonal to memory model, in: MICRO-37, 2004.
-
J.R. Crandall, F.T. Chong, Minos: control data attack prevention orthogonal to memory model, in: MICRO-37, 2004.
-
-
-
-
10
-
-
0016949746
-
A lattice model of secure information flow
-
Denning D.E. A lattice model of secure information flow. Communication of the ACM 19 5 (1976) 236-242
-
(1976)
Communication of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning D.E., and Denning P.J. Certification of programs for secure information flow. Communication of the ACM 20 7 (1977) 504-513
-
(1977)
Communication of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
56349130397
-
-
D.E. Denning, Secure information flow in computer systems. Ph.D. Thesis, Computer Science Department, Purdue U., W. Lafayette, Ind., May 1975.
-
D.E. Denning, Secure information flow in computer systems. Ph.D. Thesis, Computer Science Department, Purdue U., W. Lafayette, Ind., May 1975.
-
-
-
-
13
-
-
0036459423
-
Handling pointers and unstructured statements in the forward computed dynamic slice algorithm
-
Faragó C., and Gergely T. Handling pointers and unstructured statements in the forward computed dynamic slice algorithm. Acta Cybernetica 15 (2002) 489-508
-
(2002)
Acta Cybernetica
, vol.15
, pp. 489-508
-
-
Faragó, C.1
Gergely, T.2
-
14
-
-
0016382977
-
Memoryless subsystems
-
Fenton J.S. Memoryless subsystems. The Computer Journal 17 2 (1974) 143-147
-
(1974)
The Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
16
-
-
84887476214
-
-
T. Gyimothy, A. Beszedes, C. Farago, An efficient relevant slicing method for debugging, in: Proceedings of the 7th European Software Engineering Coinference, Toulouse, France, September 1999, pp. 303-321.
-
T. Gyimothy, A. Beszedes, C. Farago, An efficient relevant slicing method for debugging, in: Proceedings of the 7th European Software Engineering Coinference, Toulouse, France, September 1999, pp. 303-321.
-
-
-
-
17
-
-
34250656241
-
-
C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, Charleston, South Carolina, January 09-10, 2006, PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
-
C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, Charleston, South Carolina, January 09-10, 2006, PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
-
-
-
-
18
-
-
56349100869
-
-
D. Jackson, E. Rolling, A new model of program dependences for reverse engineering, in: Symposium on Foundations of Software Engineering, New Orleans, Louisiana, 1994.
-
D. Jackson, E. Rolling, A new model of program dependences for reverse engineering, in: Symposium on Foundations of Software Engineering, New Orleans, Louisiana, 1994.
-
-
-
-
19
-
-
56349135645
-
-
V. Haldar, d. Chandra, M. Franz, Practical Dynamic Information-flow for Virtual Machines, Technical Report No. 05-02, Department of Information and Computer Science, University of California, Irvine, February 2005.
-
V. Haldar, d. Chandra, M. Franz, Practical Dynamic Information-flow for Virtual Machines, Technical Report No. 05-02, Department of Information and Computer Science, University of California, Irvine, February 2005.
-
-
-
-
20
-
-
0034592895
-
-
M. Hind, A. Pioli, Which pointer analysis should I use?, International Symposium on Software Testing and Analysis, 2000.
-
M. Hind, A. Pioli, Which pointer analysis should I use?, International Symposium on Software Testing and Analysis, 2000.
-
-
-
-
22
-
-
0032181540
-
The feature and service interaction problem in telecommunications systems: a survey
-
Keck D.O., and Kuehn P.J. The feature and service interaction problem in telecommunications systems: a survey. IEEE Transactions on Software Engineering 24 10 (1998) 779-796
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.10
, pp. 779-796
-
-
Keck, D.O.1
Kuehn, P.J.2
-
23
-
-
0002904482
-
Computation of dynamic program slices for unstructured programs
-
Korel B. Computation of dynamic program slices for unstructured programs. IEEE TSE 23 1 (1997) 17-34
-
(1997)
IEEE TSE
, vol.23
, Issue.1
, pp. 17-34
-
-
Korel, B.1
-
24
-
-
84885648508
-
-
B. Korel, J. Laski, Algorithmic software fault localization, in: Proceedings of the 24th Annual Hawaii International Conference on System Sciences, vol. II, 1991, pp. 246-251.
-
B. Korel, J. Laski, Algorithmic software fault localization, in: Proceedings of the 24th Annual Hawaii International Conference on System Sciences, vol. II, 1991, pp. 246-251.
-
-
-
-
26
-
-
84980046752
-
Forward computation of dynamic program slices
-
Korel B., and Yalamanchili S. Forward computation of dynamic program slices. ISSTA (1994) 66-79
-
(1994)
ISSTA
, pp. 66-79
-
-
Korel, B.1
Yalamanchili, S.2
-
27
-
-
0015672289
-
A note on the confinement problem
-
Lampson B.W. A note on the confinement problem. Communication of the ACM 16 10 (1973) 613-615
-
(1973)
Communication of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
28
-
-
33244494413
-
-
D. Leon, W. Masri, A. Podgurski, An empirical evaluation of test case filtering techniques based on exercising complex information flows, in: International Conference on Software Engineering, St. Louis, MO, May 2005.
-
D. Leon, W. Masri, A. Podgurski, An empirical evaluation of test case filtering techniques based on exercising complex information flows, in: International Conference on Software Engineering, St. Louis, MO, May 2005.
-
-
-
-
29
-
-
16244362392
-
-
W. Masri, A. Podgurski, D. Leon, Detecting and debugging insecure information flows 15th, in: IEEE International Symposium on Software Reliability Engineering, ISSRE 2004, St. Malo, France, November 2-5, 2004.
-
W. Masri, A. Podgurski, D. Leon, Detecting and debugging insecure information flows 15th, in: IEEE International Symposium on Software Reliability Engineering, ISSRE 2004, St. Malo, France, November 2-5, 2004.
-
-
-
-
30
-
-
34547691021
-
-
W. Masri, N. Nahas, A. Podgurski, Memorized forward computation of program slices, in: 17th IEEE International Symposium on Software Reliability Engineering, ISSRE 2006. Raleigh, NC, USA, November, 2006.
-
W. Masri, N. Nahas, A. Podgurski, Memorized forward computation of program slices, in: 17th IEEE International Symposium on Software Reliability Engineering, ISSRE 2006. Raleigh, NC, USA, November, 2006.
-
-
-
-
31
-
-
85085405276
-
-
W. Masri, A. Podgurski, Using dynamic information flow analysis to detect attacks against applications, in: 2005 Workshop on Software Engineering for Security Systems, St. Louis, MI, May 2005.
-
W. Masri, A. Podgurski, Using dynamic information flow analysis to detect attacks against applications, in: 2005 Workshop on Software Engineering for Security Systems, St. Louis, MI, May 2005.
-
-
-
-
32
-
-
56349124452
-
-
W. Masri, A. Podgurski, An empirical study of the relationship between information flow and program dependence, in: Fourth International Workshop on Dynamic Analysis (WODA 2006), Shanghai, China, May 2006.
-
W. Masri, A. Podgurski, An empirical study of the relationship between information flow and program dependence, in: Fourth International Workshop on Dynamic Analysis (WODA 2006), Shanghai, China, May 2006.
-
-
-
-
33
-
-
56349128959
-
-
W. Masri, Dynamic information flow analysis, slicing, and profiling, Ph.D. dissertation, 2005, Case Western Reserve University, Cleveland, OH.
-
W. Masri, Dynamic information flow analysis, slicing, and profiling, Ph.D. dissertation, 2005, Case Western Reserve University, Cleveland, OH.
-
-
-
-
34
-
-
34250772325
-
-
W. Masri, A. Podgurski, An empirical study of test case filtering techniques based on exercising information flows, in: TSE 2007.
-
W. Masri, A. Podgurski, An empirical study of test case filtering techniques based on exercising information flows, in: TSE 2007.
-
-
-
-
36
-
-
56349168223
-
-
S. Mccamant, M. Ernst, Quantitative Information-Flow Tracking for C and Related Languages. MIT Computer Science and Artificial Intelligence Laboratory technical report MIT-CSAIL-TR-2006-076, Cambridge, MA, November 2006.
-
S. Mccamant, M. Ernst, Quantitative Information-Flow Tracking for C and Related Languages. MIT Computer Science and Artificial Intelligence Laboratory technical report MIT-CSAIL-TR-2006-076, Cambridge, MA, November 2006.
-
-
-
-
37
-
-
36448929074
-
-
S. Mccamant, M. Ernst, A simulation-based proof technique for dynamic information flow, in: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, San Diego, CA, USA, June 2007.
-
S. Mccamant, M. Ernst, A simulation-based proof technique for dynamic information flow, in: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, San Diego, CA, USA, June 2007.
-
-
-
-
38
-
-
56349097032
-
-
S. Nair, P. Simpson, B. Crispo, A. Tanenbaum, Design and implementation of a virtual machine based information flow control system, Vrije Universiteit technical report IR-CS-024, May 2007.
-
S. Nair, P. Simpson, B. Crispo, A. Tanenbaum, Design and implementation of a virtual machine based information flow control system, Vrije Universiteit technical report IR-CS-024, May 2007.
-
-
-
-
39
-
-
56349094955
-
-
J. Newsome, D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005.
-
J. Newsome, D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005.
-
-
-
-
40
-
-
0025491545
-
A formal model of program dependencies and its implications for software testing debugging and maintenance
-
Podgurski A., and Clarke L. A formal model of program dependencies and its implications for software testing debugging and maintenance. IEEE TSE 16 9 (1990) 965-979
-
(1990)
IEEE TSE
, vol.16
, Issue.9
, pp. 965-979
-
-
Podgurski, A.1
Clarke, L.2
-
41
-
-
56349142265
-
-
A. Podgurski, Significance of program dependences for software testing, debugging and maintenance. Ph.D. Thesis. Computer Sc. Dept., U. of Mass., (September 1989).
-
A. Podgurski, Significance of program dependences for software testing, debugging and maintenance. Ph.D. Thesis. Computer Sc. Dept., U. of Mass., (September 1989).
-
-
-
-
42
-
-
42449096142
-
Reachability analysis of feature interactions: a progress report
-
Pomakis K.P., and Atlee J.M. Reachability analysis of feature interactions: a progress report. ISSTA (1996) 216-223
-
(1996)
ISSTA
, pp. 216-223
-
-
Pomakis, K.P.1
Atlee, J.M.2
-
43
-
-
40349087553
-
-
Q. Feng, W. Cheng, L. Zhenmin, K. Ho-seop, Z. Yuanyuan, Wu Youfeng, LIFT: a low-overhead practical information flow tracking system for detecting security attacks, in: MICRO-39, 2006.
-
Q. Feng, W. Cheng, L. Zhenmin, K. Ho-seop, Z. Yuanyuan, Wu Youfeng, LIFT: a low-overhead practical information flow tracking system for detecting security attacks, in: MICRO-39, 2006.
-
-
-
-
46
-
-
56349116966
-
-
Soot: a Java Optimization Framework. Available from: .
-
Soot: a Java Optimization Framework. Available from: .
-
-
-
-
47
-
-
0034593043
-
-
S. Steven, P. Chandra, B. Fleck, A. Podgurski, jRapture: a capture/replay tool for observation-based testing, in: 2000 International Symposium on Software Testing and Analysis, Portland, Oregon, August 2000, pp. 158-167.
-
S. Steven, P. Chandra, B. Fleck, A. Podgurski, jRapture: a capture/replay tool for observation-based testing, in: 2000 International Symposium on Software Testing and Analysis, Portland, Oregon, August 2000, pp. 158-167.
-
-
-
-
48
-
-
12844267418
-
-
G.E. Suh, J. Lee, S. Devadas, Secure program execution via dynamic information flow tracking, in: 11th International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, 2004.
-
G.E. Suh, J. Lee, S. Devadas, Secure program execution via dynamic information flow tracking, in: 11th International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, 2004.
-
-
-
-
49
-
-
56349118232
-
-
The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
-
The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
-
-
-
-
50
-
-
56349111232
-
-
T. Lindholm, F. Yellin, The Java Virtual Machine Specification, second ed.
-
T. Lindholm, F. Yellin, The Java Virtual Machine Specification, second ed.
-
-
-
-
51
-
-
0000990322
-
A survey of program slicing techniques
-
Tip F. A survey of program slicing techniques. Journal of Programming Languages 3 3 (1995) 121-189
-
(1995)
Journal of Programming Languages
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, F.1
-
52
-
-
21644475650
-
-
N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, D. August, RIFLE: an architectural framework for user-centric information-flow security, in: Proceedings of the 37th International Symposium on Microarchitecture (MICRO), December 2004.
-
N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, D. August, RIFLE: an architectural framework for user-centric information-flow security, in: Proceedings of the 37th International Symposium on Microarchitecture (MICRO), December 2004.
-
-
-
-
53
-
-
4544284860
-
-
T. Wang, A. Roychoudhury, Using compressed bytecode traces for slicing Java programs, in: Internatonal Conference on Software Engineering, Edinburgh, UK, May 2004.
-
T. Wang, A. Roychoudhury, Using compressed bytecode traces for slicing Java programs, in: Internatonal Conference on Software Engineering, Edinburgh, UK, May 2004.
-
-
-
-
56
-
-
34548246449
-
-
B. Xin, X. Zhang, Efficient online detection of dynamic control dependence, in: International Symposium on Software Testing and Analysis, ISSTA 2007.
-
B. Xin, X. Zhang, Efficient online detection of dynamic control dependence, in: International Symposium on Software Testing and Analysis, ISSTA 2007.
-
-
-
-
57
-
-
56349120892
-
-
W. Xu, S. Bakhtar, R.A Sekar, Unified Approach to Preventing Attacks Exploiting a Range of Software Vulnerabilities, Technical Report SECLAB-05-05, Department of Computer Science, Stony Brook University, August 2005.
-
W. Xu, S. Bakhtar, R.A Sekar, Unified Approach to Preventing Attacks Exploiting a Range of Software Vulnerabilities, Technical Report SECLAB-05-05, Department of Computer Science, Stony Brook University, August 2005.
-
-
-
-
58
-
-
4544331311
-
-
X. Zhang, R. Gupta, Y. Zhang, Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams, in: International Conference on Software Engineering, Edinburgh, UK, May 2004.
-
X. Zhang, R. Gupta, Y. Zhang, Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams, in: International Conference on Software Engineering, Edinburgh, UK, May 2004.
-
-
-
-
59
-
-
0038262825
-
-
X. Zhang, R. Gupta, Y. Zhang, Precise Dynamic Slicing Algorithms, in: IEEE/ACM International Conference on Software Engineering, Portland, Oregon, May 2003, pp. 319-329.
-
X. Zhang, R. Gupta, Y. Zhang, Precise Dynamic Slicing Algorithms, in: IEEE/ACM International Conference on Software Engineering, Portland, Oregon, May 2003, pp. 319-329.
-
-
-
-
60
-
-
33746089176
-
-
X. Zhang, N. Gupta, R. Gupta, Pruning dynamic slices with confidence, in: PLDI 2006.
-
X. Zhang, N. Gupta, R. Gupta, Pruning dynamic slices with confidence, in: PLDI 2006.
-
-
-
-
61
-
-
29844458023
-
-
X. Zhang, H. He, N. Gupta, R. Gupta, Experimental evaluation of using dynamic slices for fault location, in: AADEBUG, 2005.
-
X. Zhang, H. He, N. Gupta, R. Gupta, Experimental evaluation of using dynamic slices for fault location, in: AADEBUG, 2005.
-
-
-
-
62
-
-
34247096141
-
-
X. Zhang, N. Gupta, R. Gupta, Locating Faults through automated predicate switching, in: International Conference on Software Engineering, 2006.
-
X. Zhang, N. Gupta, R. Gupta, Locating Faults through automated predicate switching, in: International Conference on Software Engineering, 2006.
-
-
-
-
63
-
-
0142219252
-
-
J. Zimmermann, L. Mé, C. Bidan, An improved reference flow control model for policy-based intrusion detection, in: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 2003, Lecture Notes in Computer Science 2808, Springer-Verlag.
-
J. Zimmermann, L. Mé, C. Bidan, An improved reference flow control model for policy-based intrusion detection, in: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 2003, Lecture Notes in Computer Science 2808, Springer-Verlag.
-
-
-
-
64
-
-
21644442136
-
-
J. Zimmermann, L. Mé, C. Bidan, Experimenting with a policy-based HIDS based on and information flow control model, in: 19th Computer Security Applications Conference, Las Vegas, November 2003.
-
J. Zimmermann, L. Mé, C. Bidan, Experimenting with a policy-based HIDS based on and information flow control model, in: 19th Computer Security Applications Conference, Las Vegas, November 2003.
-
-
-
|