-
1
-
-
84949224755
-
Applying static analysis to large-scale, multi-threaded Java programs
-
Canberra, ACT, Australia, August, IEEE Press
-
C. Artho and A. Biere. Applying static analysis to large-scale, multi-threaded Java programs. In Proceedings of the Australian Software Engineering Conference (ASWEC), pages 68-75, Canberra, ACT, Australia, August 2001. IEEE Press.
-
(2001)
Proceedings of the Australian Software Engineering Conference (ASWEC)
, pp. 68-75
-
-
Artho, C.1
Biere, A.2
-
2
-
-
84944247951
-
-
C. Artho and K. Havelund. Applying Jlint to space exploration software. In Verification, Model Checking, and Abstract Interpretation, 2937/2003 of Lecture Notes in Computer Science, pages 297-308. Springer Berling / Heidelberg, 2004.
-
C. Artho and K. Havelund. Applying Jlint to space exploration software. In Verification, Model Checking, and Abstract Interpretation, volume 2937/2003 of Lecture Notes in Computer Science, pages 297-308. Springer Berling / Heidelberg, 2004.
-
-
-
-
3
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
Proceedings of the Workshop on Model Checking of Software SPIN, May
-
T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In Proceedings of the Workshop on Model Checking of Software (SPIN), LNCS 2057, pages 103-122, May 2001.
-
(2001)
LNCS
, vol.2057
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
6
-
-
57449108197
-
-
CWE list draft 5, December 2006
-
CWE list (draft 5). http://cwe.mitre.org/data/index.html, December 2006.
-
-
-
-
7
-
-
0036040604
-
ESP: Path-sensitive program verification in polynomial time
-
Berlin, Germany, June, ACM Press
-
M. Das, S. Lerner, and M. Seigle. ESP: Path-sensitive program verification in polynomial time. In Proceedings of the Conference on Programming Language Design and Implementation (PLDI), pages 57-68, Berlin, Germany, June 2002. ACM Press.
-
(2002)
Proceedings of the Conference on Programming Language Design and Implementation (PLDI)
, pp. 57-68
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
8
-
-
0004207324
-
Extended static checking
-
Technical Report SRC-RR-159, COMPAQ Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, December
-
D. L. Detlefs, K. R. M. Leino, G. Nelson, and J. B. Saxe. Extended static checking. Technical Report SRC-RR-159, COMPAQ Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, December 1998.
-
(1998)
-
-
Detlefs, D.L.1
Leino, K.R.M.2
Nelson, G.3
Saxe, J.B.4
-
10
-
-
84975277890
-
Checking system rules using system-specific programmer-written compiler extensions
-
San Diego, CA, Oct, USENIX
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific programmer-written compiler extensions. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, pages 23-25, San Diego, CA, Oct. 2000. USENIX.
-
(2000)
Proceedings of the Fourth Symposium on Operating Systems Design and Implementation
, pp. 23-25
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
11
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
Alberta, Canada, Oct, ACM Press
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proceedings of the Eighteenth A CM Symposium on Operating Systems Principles, pages 57-72, Alberta, Canada, Oct. 2001. ACM Press.
-
(2001)
Proceedings of the Eighteenth A CM Symposium on Operating Systems Principles
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
12
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
January/February
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, pages 42-51, January/February 2002.
-
(2002)
IEEE Software
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
13
-
-
36348972193
-
Goanna - a static model checker
-
L. Brim, B. Haverkort, M. Leucker, and J. Pol, editors, Proceedings of the 11th International Workshop on Formal Methods for Industrial Critical Systems, number in, Bonn, Germany, Aug
-
A. Fehnker, R. Huuck, P. Jayet, M. Lussenburg, and F. Rauch. Goanna - a static model checker. In L. Brim, B. Haverkort, M. Leucker, and J. Pol, editors, Proceedings of the 11th International Workshop on Formal Methods for Industrial Critical Systems, number 4346 in Lecture Notes in Computer Science, Bonn, Germany, Aug. 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4346
-
-
Fehnker, A.1
Huuck, R.2
Jayet, P.3
Lussenburg, M.4
Rauch, F.5
-
14
-
-
84885956857
-
-
Last accessed: 1 April 2008
-
Fortify Static Code Analysis (SCA). http://www.fortify.com/products/sca/. Last accessed: 1 April 2008.
-
Fortify Static Code Analysis (SCA)
-
-
-
15
-
-
84961324510
-
-
Last accessed: 1 April 2008
-
GrammaTech CodeSonar. http://www.grammatech.com/products/codesonar/ overview.html. Last accessed: 1 April 2008.
-
GrammaTech CodeSonar
-
-
-
17
-
-
14544301479
-
Finding bugs is easy
-
Vancouver, BC, Canada, Oct, ACM Press
-
D. Hovemeyer and W. Pugh. Finding bugs is easy. In Companion to the 19th annual ACM SIGPLAN Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA), pages 92-106, Vancouver, BC, Canada, Oct. 2004. ACM Press.
-
(2004)
Companion to the 19th annual ACM SIGPLAN Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA)
, pp. 92-106
-
-
Hovemeyer, D.1
Pugh, W.2
-
18
-
-
57449098091
-
-
PhD thesis, University of California, Berkeley, Fall
-
R. Jhala. Lazy Abstraction. PhD thesis, University of California, Berkeley, Fall 2004.
-
(2004)
Lazy Abstraction
-
-
Jhala, R.1
-
19
-
-
0012529658
-
Lint, a C program checker
-
AT&T Bell Laboratories
-
S. Johnson. Lint, a C program checker. Unix Programmer's Manual, AT&T Bell Laboratories, 1978.
-
(1978)
Unix Programmer's Manual
-
-
Johnson, S.1
-
23
-
-
36549014520
-
BugBench: A benchmark for evaluating bug detection tools
-
June
-
S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou. BugBench: A benchmark for evaluating bug detection tools. In Proc. of Workshop on the Evaluation of Software Defect Detection Tools, June 2005.
-
(2005)
Proc. of Workshop on the Evaluation of Software Defect Detection Tools
-
-
Lu, S.1
Li, Z.2
Qin, F.3
Tan, L.4
Zhou, P.5
Zhou, Y.6
-
24
-
-
57449111599
-
Elsa/Oink/Cqual+
-
February
-
S. McPeak. Elsa/Oink/Cqual+. Talk at CodeCon, February 2006.
-
(2006)
Talk at CodeCon
-
-
McPeak, S.1
-
25
-
-
57449085241
-
-
NIST SÁMATE, software assurance metrics and tool evaluation, Last accessed: January 2007
-
NIST SÁMATE - software assurance metrics and tool evaluation, http://samate.nist.gov. Last accessed: January 2007.
-
-
-
-
27
-
-
56349145159
-
User-input dependence analysis via graph reachability
-
TR-2008-117, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March
-
B. Scholz, C. Zhang, and C. Cifuentes. User-input dependence analysis via graph reachability. Technical Report SMLI TR-2008-117, Sun Microsystems Laboratories, 16 Network Circle, Menlo Park, CA 94025, March 2008.
-
(2008)
Technical Report SMLI
-
-
Scholz, B.1
Zhang, C.2
Cifuentes, C.3
-
28
-
-
33744736364
-
Secure Coding in C and C++
-
Addison-Wesley, Sept
-
R. C. Seacord. Secure Coding in C and C++. SEI Series, A CERT Book. Addison-Wesley, Sept. 2005.
-
(2005)
SEI Series. A CERT Book
-
-
Seacord, R.C.1
-
29
-
-
30344442772
-
Seven pernicious kingdoms: A taxonomy of software security errors
-
November/December
-
K. Tsipenyuk, B. Chess, and G. McGraw. Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security & Privacy, 3(6):81-84, November/December 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.6
, pp. 81-84
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
-
30
-
-
57449121721
-
-
Last accessed: January 2007
-
Veracode website, http://www.veracode.com/. Last accessed: January 2007.
-
Veracode website
-
-
-
31
-
-
80053203899
-
Leveraging static analysis for a multidimensional view of software quality and security: Klocwork's solution
-
IDC, Framingham, MA, Sept
-
M. Webster. Leveraging static analysis for a multidimensional view of software quality and security: Klocwork's solution. White paper, IDC, Framingham, MA, Sept. 2005.
-
(2005)
White paper
-
-
Webster, M.1
-
32
-
-
1542317050
-
Archer: Using symbolic, path-sensitive analysis to detect memory access errors
-
New York, NY, USA, ACM Press
-
Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. In ESEC/FSE-11: Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, pages 327-336, New York, NY, USA, 2003. ACM Press.
-
(2003)
ESEC/FSE-11: Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering
, pp. 327-336
-
-
Xie, Y.1
Chou, A.2
Engler, D.3
-
33
-
-
20344363200
-
Testing static analysis tools using exploitable buffer overflows from open source code
-
New York, NY, USA, ACM Press
-
M. Zitser, R. Lippmann, and T. Leek. Testing static analysis tools using exploitable buffer overflows from open source code. In SIGSOFT '04/FSE-12: Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering, pages 97-106, New York, NY, USA, 2004. ACM Press.
-
(2004)
SIGSOFT '04/FSE-12: Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering
, pp. 97-106
-
-
Zitser, M.1
Lippmann, R.2
Leek, T.3
|