메뉴 건너뛰기




Volumn , Issue , 2008, Pages 4-11

Parfait - Designing a scalable bug checker

Author keywords

Static analysis

Indexed keywords

ACOUSTIC SURFACE WAVE DEVICES; ACOUSTIC SURFACE WAVE FILTERS; ACOUSTIC WAVE VELOCITY; CARBON DIOXIDE ARC WELDING; CODES (SYMBOLS); TECHNICAL PRESENTATIONS; TURBULENT FLOW;

EID: 57449091145     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1394504.1394505     Document Type: Conference Paper
Times cited : (39)

References (33)
  • 1
    • 84949224755 scopus 로고    scopus 로고
    • Applying static analysis to large-scale, multi-threaded Java programs
    • Canberra, ACT, Australia, August, IEEE Press
    • C. Artho and A. Biere. Applying static analysis to large-scale, multi-threaded Java programs. In Proceedings of the Australian Software Engineering Conference (ASWEC), pages 68-75, Canberra, ACT, Australia, August 2001. IEEE Press.
    • (2001) Proceedings of the Australian Software Engineering Conference (ASWEC) , pp. 68-75
    • Artho, C.1    Biere, A.2
  • 2
    • 84944247951 scopus 로고    scopus 로고
    • C. Artho and K. Havelund. Applying Jlint to space exploration software. In Verification, Model Checking, and Abstract Interpretation, 2937/2003 of Lecture Notes in Computer Science, pages 297-308. Springer Berling / Heidelberg, 2004.
    • C. Artho and K. Havelund. Applying Jlint to space exploration software. In Verification, Model Checking, and Abstract Interpretation, volume 2937/2003 of Lecture Notes in Computer Science, pages 297-308. Springer Berling / Heidelberg, 2004.
  • 3
    • 84894630000 scopus 로고    scopus 로고
    • Automatically validating temporal safety properties of interfaces
    • Proceedings of the Workshop on Model Checking of Software SPIN, May
    • T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In Proceedings of the Workshop on Model Checking of Software (SPIN), LNCS 2057, pages 103-122, May 2001.
    • (2001) LNCS , vol.2057 , pp. 103-122
    • Ball, T.1    Rajamani, S.K.2
  • 6
    • 57449108197 scopus 로고    scopus 로고
    • CWE list draft 5, December 2006
    • CWE list (draft 5). http://cwe.mitre.org/data/index.html, December 2006.
  • 8
    • 0004207324 scopus 로고    scopus 로고
    • Extended static checking
    • Technical Report SRC-RR-159, COMPAQ Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, December
    • D. L. Detlefs, K. R. M. Leino, G. Nelson, and J. B. Saxe. Extended static checking. Technical Report SRC-RR-159, COMPAQ Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, December 1998.
    • (1998)
    • Detlefs, D.L.1    Leino, K.R.M.2    Nelson, G.3    Saxe, J.B.4
  • 12
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • January/February
    • D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, pages 42-51, January/February 2002.
    • (2002) IEEE Software , pp. 42-51
    • Evans, D.1    Larochelle, D.2
  • 13
    • 36348972193 scopus 로고    scopus 로고
    • Goanna - a static model checker
    • L. Brim, B. Haverkort, M. Leucker, and J. Pol, editors, Proceedings of the 11th International Workshop on Formal Methods for Industrial Critical Systems, number in, Bonn, Germany, Aug
    • A. Fehnker, R. Huuck, P. Jayet, M. Lussenburg, and F. Rauch. Goanna - a static model checker. In L. Brim, B. Haverkort, M. Leucker, and J. Pol, editors, Proceedings of the 11th International Workshop on Formal Methods for Industrial Critical Systems, number 4346 in Lecture Notes in Computer Science, Bonn, Germany, Aug. 2006.
    • (2006) Lecture Notes in Computer Science , vol.4346
    • Fehnker, A.1    Huuck, R.2    Jayet, P.3    Lussenburg, M.4    Rauch, F.5
  • 14
    • 84885956857 scopus 로고    scopus 로고
    • Last accessed: 1 April 2008
    • Fortify Static Code Analysis (SCA). http://www.fortify.com/products/sca/. Last accessed: 1 April 2008.
    • Fortify Static Code Analysis (SCA)
  • 15
    • 84961324510 scopus 로고    scopus 로고
    • Last accessed: 1 April 2008
    • GrammaTech CodeSonar. http://www.grammatech.com/products/codesonar/ overview.html. Last accessed: 1 April 2008.
    • GrammaTech CodeSonar
  • 18
    • 57449098091 scopus 로고    scopus 로고
    • PhD thesis, University of California, Berkeley, Fall
    • R. Jhala. Lazy Abstraction. PhD thesis, University of California, Berkeley, Fall 2004.
    • (2004) Lazy Abstraction
    • Jhala, R.1
  • 19
    • 0012529658 scopus 로고
    • Lint, a C program checker
    • AT&T Bell Laboratories
    • S. Johnson. Lint, a C program checker. Unix Programmer's Manual, AT&T Bell Laboratories, 1978.
    • (1978) Unix Programmer's Manual
    • Johnson, S.1
  • 24
    • 57449111599 scopus 로고    scopus 로고
    • Elsa/Oink/Cqual+
    • February
    • S. McPeak. Elsa/Oink/Cqual+. Talk at CodeCon, February 2006.
    • (2006) Talk at CodeCon
    • McPeak, S.1
  • 25
    • 57449085241 scopus 로고    scopus 로고
    • NIST SÁMATE, software assurance metrics and tool evaluation, Last accessed: January 2007
    • NIST SÁMATE - software assurance metrics and tool evaluation, http://samate.nist.gov. Last accessed: January 2007.
  • 27
    • 56349145159 scopus 로고    scopus 로고
    • User-input dependence analysis via graph reachability
    • TR-2008-117, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March
    • B. Scholz, C. Zhang, and C. Cifuentes. User-input dependence analysis via graph reachability. Technical Report SMLI TR-2008-117, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March 2008.
    • (2008) Technical Report SMLI
    • Scholz, B.1    Zhang, C.2    Cifuentes, C.3
  • 28
    • 33744736364 scopus 로고    scopus 로고
    • Secure Coding in C and C++
    • Addison-Wesley, Sept
    • R. C. Seacord. Secure Coding in C and C++. SEI Series, A CERT Book. Addison-Wesley, Sept. 2005.
    • (2005) SEI Series. A CERT Book
    • Seacord, R.C.1
  • 29
    • 30344442772 scopus 로고    scopus 로고
    • Seven pernicious kingdoms: A taxonomy of software security errors
    • November/December
    • K. Tsipenyuk, B. Chess, and G. McGraw. Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security & Privacy, 3(6):81-84, November/December 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.6 , pp. 81-84
    • Tsipenyuk, K.1    Chess, B.2    McGraw, G.3
  • 30
    • 57449121721 scopus 로고    scopus 로고
    • Last accessed: January 2007
    • Veracode website, http://www.veracode.com/. Last accessed: January 2007.
    • Veracode website
  • 31
    • 80053203899 scopus 로고    scopus 로고
    • Leveraging static analysis for a multidimensional view of software quality and security: Klocwork's solution
    • IDC, Framingham, MA, Sept
    • M. Webster. Leveraging static analysis for a multidimensional view of software quality and security: Klocwork's solution. White paper, IDC, Framingham, MA, Sept. 2005.
    • (2005) White paper
    • Webster, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.