-
1
-
-
33845946966
-
-
Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Denmark
-
L. O. Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Denmark, 1994.
-
(1994)
Program
-
-
Andersen, L.O.1
-
2
-
-
0036086884
-
Using Programmer-Written Compiler Extensions to Catch Security Holes
-
K. Ashcraft and D. Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. In S&P 2002.
-
S&P 2002
-
-
Ashcraft, K.1
Engler, D.2
-
3
-
-
0034448902
-
ABCD: Eliminating Array Bounds Checks on Demand
-
R. Bodík, R. Gupta, and V. Sarkar. ABCD: Eliminating Array Bounds Checks on Demand. In PLDI 2000.
-
(2000)
PLDI
-
-
Bodík, R.1
Gupta, R.2
Sarkar, V.3
-
4
-
-
67649859970
-
Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis
-
W. Chang, B. Streiff, and C. Lin. Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis. In CCS 2008.
-
CCS 2008
-
-
Chang, W.1
Streiff, B.2
Lin, C.3
-
6
-
-
0026243790
-
Efficiently Computing Static Single Assignment Form and the Control Dependence Graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently Computing Static Single Assignment Form and the Control Dependence Graph. TOPLAS, 13(4), 1991.
-
(1991)
TOPLAS
, vol.13
, Issue.4
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
7
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
D. E. Denning. A Lattice Model of Secure Information Flow. CACM, 19(5), 1976.
-
(1976)
CACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
8
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. CACM, 20(7), 1977.
-
(1977)
CACM
, vol.20
, Issue.7
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
67650793474
-
-
S. Fink, J. Dolby, and L. Colby. Semi-Automatic J2EE Transaction Configuration. IBM Research Report RC23326, 2004.
-
S. Fink, J. Dolby, and L. Colby. Semi-Automatic J2EE Transaction Configuration. IBM Research Report RC23326, 2004.
-
-
-
-
13
-
-
34250357872
-
Information Flow Control for Java Based on Path Conditions in Dependence Graphs
-
C. Hammer, J. Krinke, and G. Snelting. Information Flow Control for Java Based on Path Conditions in Dependence Graphs. In ISSSE 2006.
-
ISSSE 2006
-
-
Hammer, C.1
Krinke, J.2
Snelting, G.3
-
14
-
-
0031642547
-
Using Static Single Assignment Form to Improve Flow-insensitive Pointer Analysis
-
R. Hasti and S. Horwitz. Using Static Single Assignment Form to Improve Flow-insensitive Pointer Analysis. In PLDI 1998.
-
PLDI 1998
-
-
Hasti, R.1
Horwitz, S.2
-
18
-
-
35548979013
-
Context-Sensitive Points-to Analysis: Is It Worth It?
-
O. Lhoták and L. J. Hendren. Context-Sensitive Points-to Analysis: Is It Worth It? In CC 2006.
-
CC 2006
-
-
Lhoták, O.1
Hendren, L.J.2
-
20
-
-
84923564816
-
Finding Security Vulnerabilities in Java Applications with Static Analysis
-
V. B. Livshits and M. S. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis. In USENIX Security 2005.
-
USENIX Security 2005
-
-
Livshits, V.B.1
Lam, M.S.2
-
21
-
-
57349180506
-
Quantitative Information Flow as Network Flow Capacity
-
S. McCamant and M. D. Ernst. Quantitative Information Flow as Network Flow Capacity. In PLDI 2008.
-
PLDI 2008
-
-
McCamant, S.1
Ernst, M.D.2
-
22
-
-
13844296853
-
Parameterized Object Sensitivity for Points-to Analysis for Java
-
A. Milanova, A. Rountev, and B. G. Ryder. Parameterized Object Sensitivity for Points-to Analysis for Java. TOSEM, 14(1), 2005.
-
(2005)
TOSEM
, vol.14
, Issue.1
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
23
-
-
33749823368
-
Static Approximation of Dynamically Generated Web
-
Y. Minamide. Static Approximation of Dynamically Generated Web Pages. In WWW 2005.
-
WWW 2005
-
-
Minamide, Y.1
-
24
-
-
0032646625
-
JFlow: Practical Mostly-static Information Flow Control
-
A. C. Myers. JFlow: Practical Mostly-static Information Flow Control. In POPL 1999.
-
POPL 1999
-
-
Myers, A.C.1
-
25
-
-
0002934582
-
A Decentralized Model for Information Flow Control
-
A. C. Myers and B. Liskov. A Decentralized Model for Information Flow Control. In SOSP 1997.
-
SOSP 1997
-
-
Myers, A.C.1
Liskov, B.2
-
26
-
-
84869521110
-
-
OWASP
-
OWASP, http://www.owasp.org.
-
-
-
-
27
-
-
33745965014
-
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In ECOOP 2005.
-
ECOOP 2005
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
28
-
-
0029180939
-
Precise Interprocedural Dataflow Analysis via Graph Reachability
-
T. Reps, S. Horwitz, and M. Sagiv. Precise Interprocedural Dataflow Analysis via Graph Reachability. In POPL 1995.
-
POPL 1995
-
-
Reps, T.1
Horwitz, S.2
Sagiv, M.3
-
29
-
-
80051939591
-
Dimensions of Precision in Reference Analysis of Object-Oriented Languages
-
Invited Paper
-
B. G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Languages. In CC 2003. Invited Paper.
-
CC 2003
-
-
Ryder, B.G.1
-
31
-
-
33750912954
-
Efficent Path Conditions in Dependence Graphs for Software Safety Analysis
-
G. Snelting, T. Robschink, and J. Krinke. Efficent Path Conditions in Dependence Graphs for Software Safety Analysis. TOSEM, 15(4), 2006.
-
(2006)
TOSEM
, vol.15
, Issue.4
-
-
Snelting, G.1
Robschink, T.2
Krinke, J.3
-
32
-
-
33746049190
-
Refinement-based Context-sensitive Points-to Analysis for Java
-
M. Sridharan and R. Bodík. Refinement-based Context-sensitive Points-to Analysis for Java. In PLDI 2006.
-
PLDI 2006
-
-
Sridharan, M.1
Bodík, R.2
-
36
-
-
0030370740
-
A Sound Type System for Secure Flow Analysis
-
D. Volpano, C. Irvine, and G. Smith. A Sound Type System for Secure Flow Analysis. JCS, 4(2-3), 1996.
-
(1996)
JCS
, vol.4
, Issue.2-3
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
38
-
-
35449004893
-
Sound and Precise Analysis of Web Applications for Injection Vulnerabilities
-
G. Wassermann and Z. Su. Sound and Precise Analysis of Web Applications for Injection Vulnerabilities. In PLDI 2007.
-
PLDI 2007
-
-
Wassermann, G.1
Su, Z.2
-
39
-
-
57349153984
-
-
G. Wassermann and Z. Su. Static Detection of Cross-site Scripting Vulnerabilities. In ICSE 2008.
-
G. Wassermann and Z. Su. Static Detection of Cross-site Scripting Vulnerabilities. In ICSE 2008.
-
-
-
-
40
-
-
8344251741
-
Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams
-
J. Whaley and M. S. Lam. Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams. In PLDI 2004.
-
PLDI 2004
-
-
Whaley, J.1
Lam, M.S.2
|