-
1
-
-
0025448361
-
Dynamic program slicing
-
(June)
-
AGRAWAL, H. AND HORGAN, J. 1990. Dynamic program slicing. SIGPLAN Not. 25, 6 (June), 246-256.
-
(1990)
SIGPLAN Not.
, vol.25
, Issue.6
, pp. 246-256
-
-
Agrawal, H.1
Horgan, J.2
-
2
-
-
33244493965
-
Efficient and precise dynamic impact analysis using ExecuteAfter sequences
-
(St. Louis, MO, May)
-
APIWATTANAPONG, T., ORSO A., ANDHARROLD, M. J. 2005. Efficient and precise dynamic impact analysis using ExecuteAfter sequences. In Proceedings of the International Conference on Software Engineering (St. Louis, MO, May).
-
(2005)
In Proceedings of the International Conference on Software Engineering
-
-
Apiwattanapong, T.1
Orso, A.2
Andharrold, M.J.3
-
5
-
-
70350229485
-
Statistics for Experimenters: Design, Innovation, and Discovery, 2nd ed
-
BOX, G. E. P., HUNTER, J. S., AND HUNTER, W. G. 2005. Statistics for Experimenters: Design, Innovation, and Discovery, 2nd ed. Wiley, New York, NY.
-
(2005)
Wiley, New York, NY
-
-
Box, G.E.P.1
Hunter, J.S.2
Hunter, W.G.3
-
7
-
-
70350229484
-
Quantified interference: Information theory and informationflow
-
ACM SIGPLAN, and GI FoMSESS Workshop on Issues in the Theory of Security (Barcelona, Spain, Apr.)
-
CLARK, D., HUNT S., AND MALACARIA, P. 2004. Quantified interference: Information theory and informationflow. In Proceedings of the IFIP WG 1.7, ACM SIGPLAN, and GI FoMSESS Workshop on Issues in the Theory of Security (Barcelona, Spain, Apr.).
-
(2004)
In Proceedings of the IFIP WG
, vol.1
, Issue.7
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
10
-
-
77953578234
-
Mining object behavior with ADABU
-
(WODA, Shanghai, China, May)
-
DALLMEIER, V., LINDIG, C., WASYLKOWSKI, A., ZELLER, A. 2006. Mining object behavior with ADABU. InProceedings of the 4th International Workshop on Dynamic Analysis(WODA, Shanghai, China, May).
-
(2006)
InProceedings of the 4th International Workshop on Dynamic Analysis
-
-
Dallmeier, V.1
Lindig, C.2
Wasylkowski, A.3
Zeller, A.4
-
11
-
-
0016949746
-
A lattice model of secure information flow. Commun
-
DENNING, D. E. 1976. A lattice model of secure information flow. Commun. ACM. 19, 5, 236-242.
-
(1976)
ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
13
-
-
0017517624
-
Certification of programs for secure information flow. Commun
-
DENNING, D. E. AND DENNING, P. J. 1977. Certification of programs for secure information flow. Commun. ACM. 20, 7, 504-513.
-
(1977)
ACM.
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
14
-
-
26044480846
-
Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact
-
DO, H., ELBAUM, S., AND ROTHERMEL, G. 2005. Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Emp. Softw. Eng. Internat. J. 10, 4, 405-435.
-
(2005)
Emp. Softw. Eng. Internat. J.
, vol.10
, Issue.4
, pp. 405-435
-
-
Do, H.1
Elbaum, S.2
Rothermel, G.3
-
15
-
-
0016382977
-
Memoryless subsystems
-
FENTON, J. S. 1974. Memoryless subsystems. Comput. J. 17, 2, 143-147.
-
(1974)
Comput. J.
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
16
-
-
0023385308
-
The program dependence graph and its use in optimization
-
(July)
-
FERRANTE, J., OTTENSTEIN, K. J., AND WARREN, J. D. 1987. The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. 9, 3 (July), 319-349.
-
(1987)
ACM Trans. Program. Lang. Syst.
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
20
-
-
0015672289
-
A note on the confinement problem
-
LAMPSON, B. W. 1973. A note on the confinement problem. Commun. ACM. 16, 10, 613-615.
-
(1973)
Commun. ACM.
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
24
-
-
34547718529
-
Dynamic information flow analysis, slicing and profiling
-
Cleveland, OH.
-
MASRI, W. 2004. Dynamic information flow analysis, slicing and profiling. Ph.D. dissertation. Case Western Reserve University, Cleveland, OH. wwwlib.umi.com/dissertations/fullcit/3146448.
-
(2004)
Ph.D. Dissertation. Case Western Reserve University
-
-
Masri, W.1
-
25
-
-
85085405276
-
Using dynamic information flow analysis to detect attacks against applications
-
(SESS, St. Louis, MO, May)
-
MASRI, W. AND PODGURSKI, A. 2005. Using dynamic information flow analysis to detect attacks against applications. In Proceedings of the Software Engineering for Secure Systems (SESS, St. Louis, MO, May).
-
(2005)
In Proceedings of the Software Engineering for Secure Systems
-
-
Masri, W.1
Podgurski, A.2
-
26
-
-
67650787118
-
An empirical study of the strength of information flows in programs
-
(WODA, Shanghai, China, May)
-
MASRI, W. AND PODGURSKI, A. 2006. An empirical study of the strength of information flows in programs. InProceedings of the 4th International Workshop on Dynamic Analysis(WODA, Shanghai, China, May).
-
(2006)
InProceedings of the 4th International Workshop on Dynamic Analysis
-
-
Masri, W.1
Podgurski, A.2
-
27
-
-
16244362392
-
Detecting and debugging insecure information flows
-
(ISSRE, St. Malo, France, Nov.)
-
MASRI, W., PODGURSKI, A.,ANDLEON,D. 2004. Detecting and debugging insecure information flows. In Proceedings of the 15th IEEE International Symposium on Software Reliability Engineering (ISSRE, St. Malo, France, Nov.).
-
(2004)
Proceedings of the 15th IEEE International Symposium on Software Reliability Engineering
-
-
Masri, W.1
-
28
-
-
34250772325
-
An empirical study of test case filtering techniques based on exercising information flows
-
MASRI, W., PODGURSKI, A., AND LEON, D. 2007. An empirical study of test case filtering techniques based on exercising information flows. In Proceedings of the IEEE Trans. Softw. Eng. 33, 7, 454-477.
-
(2007)
In Proceedings of the IEEE Trans. Softw. Eng.
, vol.33
, Issue.7
, pp. 454-477
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
-
32
-
-
84965066515
-
Announcing the Advanced Encryption Standard (AES)
-
NIST Nov. 26. National Institute of Science and Technology, Gaithersburg MD.
-
NIST. 2001. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, Nov. 26. National Institute of Science and Technology, Gaithersburg MD. http://csrc.nist.gov/publications/ fips/fips197/fips-197.pdf.
-
(2001)
Federal Information Processing Standards Publication
, vol.197
-
-
-
33
-
-
0004213845
-
-
Cambridge University Press, Cambridge, U.K
-
PEARL, J. 2000. Causality. Cambridge University Press, Cambridge, U.K.
-
(2000)
Causality
-
-
Pearl, J.1
-
34
-
-
0040824504
-
Significance of program dependences for software testing, debugging and maintenance
-
University of Massachusetts, Amherst, MA
-
PODGURSKI, A. 1989. Significance of program dependences for software testing, debugging and maintenance. Ph.D. dissertation, Computer Science Department, University of Massachusetts, Amherst, MA.
-
(1989)
Ph.D. Dissertation, Computer Science Department
-
-
Podgurski, A.1
-
35
-
-
0025491545
-
A formal model of program dependencies and its implications for software testing, debugging, and maintenance
-
PODGURSKI, A. AND CLARKE, L. 1990. A formal model of program dependencies and its implications for software testing, debugging, and maintenance. IEEE Trans. Softw. Eng. 16, 9, 965-979.
-
(1990)
IEEE Trans. Softw. Eng.
, vol.16
, Issue.9
, pp. 965-979
-
-
Podgurski, A.1
Clarke, L.2
-
38
-
-
0040027541
-
-
SINHA S., HARROLD, M. J., AND ROTHERMEL, G. 2000. Interprocedural control dependence. ACM Trans. Softw. Eng. Methodol. 10, 1, 209-254.
-
(2000)
Interprocedural Control Dependence. ACM Trans. Softw. Eng. Methodol.
, vol.10
, Issue.1
, pp. 209-254
-
-
Sinha, S.1
Harrold, M.J.2
Rothermel, G.3
-
39
-
-
0040717953
-
-
MIT Press, Cambridge, MA
-
SPIRTES, P., GLYM OUR, C., AND SCHEINES, R. 2000. Causality, Prediction, and Search, 2nd ed. MIT Press, Cambridge, MA.
-
(2000)
Causality, Prediction, and Search, 2nd Ed
-
-
Spirtes, P.1
Glym Our, C.2
Scheines, R.3
-
40
-
-
0034593043
-
JRapture: A capture/replay tool for observation-based testing. 2000
-
(Portland, OR)
-
STEVEN, S., CHANDRA, P., FLECK, B., AND PODGURSKI, A. 2000. jRapture: A capture/replay tool for observation-based testing. 2000. In Proceedings of the International Symposium on Software Testing and Analysis. (Portland, OR), 158-167.
-
(2000)
In Proceedings of the International Symposium on Software Testing and Analysis
, pp. 158-167
-
-
Steven, S.1
Chandra, P.2
Fleck, B.3
Podgurski, A.4
-
41
-
-
0000990322
-
A survey of program slicing techniques
-
TIP, F. 1995. A survey of program slicing techniques. J. Program. Lang. 3, 3, 121-189.
-
(1995)
J. Program. Lang.
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, F.1
-
42
-
-
0037384036
-
Model checking programs
-
VISSER, W., HAVELUND, K., BRAT, G. P., PARK, S., AND LERDA, F. 2003. Model checking programs. Automat. Softw. Eng. 10, 2, 203-232.
-
(2003)
Automat. Softw. Eng.
, vol.10
, Issue.2
, pp. 203-232
-
-
Visser, W.1
Havelund, K.2
Brat, G.P.3
Park, S.4
Lerda, F.5
-
43
-
-
0027557279
-
Semantic metrics for software testability
-
VOAS, J. AND MILLER, K. 1993. Semantic metrics for software testability. J. Syst. Softw. 20, 3, 207-216.
-
(1993)
J. Syst. Softw.
, vol.20
, Issue.3
, pp. 207-216
-
-
Voas, J.1
Miller, K.2
-
44
-
-
0034592888
-
Testability, fault size and the domain-to-range ratio: An eternal triangle
-
WOODWARD M. AND AL-KHANJAR, Z. 2000. Testability, fault size and the domain-to-range ratio: An eternal triangle. In Proceedings of the ISSTA. 168-172.
-
(2000)
In Proceedings of the ISSTA.
, pp. 168-172
-
-
Woodward, M.1
Al-Khanjar, Z.2
-
49
-
-
29844458023
-
Experimental evaluation of using dynamic slices for fault location
-
ZHANG, X., HE, H., GUPTA, N., AND GUPTA, R. 2005. Experimental evaluation of using dynamic slices for fault location. In Proceedings of the AADEBUG.
-
(2005)
In Proceedings of the AADEBUG
-
-
Zhang, X.1
He, H.2
Gupta, N.3
Gupta, R.4
|