-
1
-
-
84958775802
-
Speeding up dataflow analysis using flow-insensitive pointer analysis
-
S. Adams, T. Ball, M. Das, S. Lerner, S. K. Rajamani, M. Seigle, and W. Weimer. Speeding up dataflow analysis using flow-insensitive pointer analysis. In Static Analysis Symposium, pages 230-246, 2002.
-
(2002)
Static Analysis Symposium
, pp. 230-246
-
-
Adams, S.1
Ball, T.2
Das, M.3
Lerner, S.4
Rajamani, S.K.5
Seigle, M.6
Weimer, W.7
-
2
-
-
33745893080
-
Regular language matching and other decidable cases of the satisfiability problem for constraints between regular open terms
-
S. Bala. Regular language matching and other decidable cases of the satisfiability problem for constraints between regular open terms. In STACS, pages 596-607, 2004.
-
(2004)
STACS
, pp. 596-607
-
-
Bala, S.1
-
3
-
-
35048904185
-
Zapato: Automatic theorem proving for predicate abstraction refinement
-
T. Ball, B. Cook, S. K. Lahiri, and L. Zhang. Zapato: Automatic theorem proving for predicate abstraction refinement. In Computer Aided Verification, pages 457-461, 2004.
-
(2004)
Computer Aided Verification
, pp. 457-461
-
-
Ball, T.1
Cook, B.2
Lahiri, S.K.3
Zhang, L.4
-
4
-
-
1442339050
-
From symptom to cause: Localizing errors in counterexample traces
-
T. Ball, M. Naik, and S. K. Rajamani. From symptom to cause: localizing errors in counterexample traces. SIGPLAN Not., 38(1):97-105, 2003.
-
(2003)
SIGPLAN Not
, vol.38
, Issue.1
, pp. 97-105
-
-
Ball, T.1
Naik, M.2
Rajamani, S.K.3
-
5
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
May
-
T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN Workshop on Model Checking of Software, pages 103-122, May 2001.
-
(2001)
SPIN Workshop on Model Checking of Software
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
8
-
-
67650854428
-
-
British Broadcasting Corporation, Aug
-
British Broadcasting Corporation. UN's website breached by hackers. In http://news.bbc.co.uk/2/hi/technology/6943385.stm, Aug. 2007.
-
(2007)
UN's website breached by hackers
-
-
-
9
-
-
37149019057
-
Deciding bit-vector arithmetic with abstraction
-
R. E. Bryant, D. Kroening, J. Ouaknine, S. A. Seshia, O. Strichman, and B. Brady. Deciding bit-vector arithmetic with abstraction. In Tools and Algorithms for the Construction and Analysis of Systems, pages 358-372, 2007.
-
(2007)
Tools and Algorithms for the Construction and Analysis of Systems
, pp. 358-372
-
-
Bryant, R.E.1
Kroening, D.2
Ouaknine, J.3
Seshia, S.A.4
Strichman, O.5
Brady, B.6
-
10
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: automatically generating inputs of death. In Computer and Communications Security, pages 322-335, 2006.
-
(2006)
Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
12
-
-
0023965424
-
The calculus of constructions
-
T. Coquand and G. P. Huet. The calculus of constructions. Inf. Comput., 76(2/3):95-120, 1988.
-
(1988)
Inf. Comput
, vol.76
, Issue.2-3
, pp. 95-120
-
-
Coquand, T.1
Huet, G.P.2
-
14
-
-
24944448541
-
Simplify: A theorem prover for program checking
-
D. Detlefs, G. Nelson, and J. B. Saxe. Simplify: a theorem prover for program checking. J. ACM, 52(3):365-473, 2005.
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 365-473
-
-
Detlefs, D.1
Nelson, G.2
Saxe, J.B.3
-
15
-
-
38149088089
-
A decision procedure for bit-vectors and arrays
-
V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In Computer-Aided Verification, pages 519-531, 2007.
-
(2007)
Computer-Aided Verification
, pp. 519-531
-
-
Ganesh, V.1
Dill, D.L.2
-
16
-
-
57349133785
-
Grammar-based whitebox fuzzing
-
Tucson, AZ, USA, June 9-11
-
P. Godefroid, A. Kieżun, and M. Y. Levin. Grammar-based whitebox fuzzing. In Programming Language Design and Implementation, Tucson, AZ, USA, June 9-11, 2008.
-
(2008)
Programming Language Design and Implementation
-
-
Godefroid, P.1
Kieżun, A.2
Levin, M.Y.3
-
19
-
-
84937567800
-
Temporal-safety proofs for systems code
-
T. A. Henzinger, R. Jhala, R. Majumdar, G. C. Necula, G. Sutre, and W. Weimer. Temporal-safety proofs for systems code. In Computer Aided Verification, pages 526-538, 2002.
-
(2002)
Computer Aided Verification
, pp. 526-538
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Necula, G.C.4
Sutre, G.5
Weimer, W.6
-
20
-
-
0036041563
-
Lazy abstraction
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Lazy abstraction. In Principles of Programming Languages, pages 58-70, 2002.
-
(2002)
Principles of Programming Languages
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
21
-
-
84870642502
-
Cross-site scripting: Attackers' new favorite flaw
-
Technical report, Sept
-
K. J. Higgins. Cross-site scripting: attackers' new favorite flaw. Technical report, http://www.darkreading.com/document.asp?doc-id=103774&WT. svl=news1-1, Sept. 2006.
-
(2006)
-
-
Higgins, K.J.1
-
24
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In Symposium on Security and Privacy, pages 258-263, 2006.
-
(2006)
Symposium on Security and Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
25
-
-
84869674048
-
-
A. Kieżun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst. HAMPI: A solver for string constraints. technical report, Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory
-
A. Kieżun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst. HAMPI: A solver for string constraints. technical report, Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory.
-
-
-
-
26
-
-
33646044421
-
Banshee: A scalable constraint-based analysis toolkit
-
J. Kodumal and A. Aiken. Banshee: A scalable constraint-based analysis toolkit. In Static Analysis Symposium, pages 218-234, 2005.
-
(2005)
Static Analysis Symposium
, pp. 218-234
-
-
Kodumal, J.1
Aiken, A.2
-
27
-
-
34547231669
-
The power of commuting with finite sets of words
-
M. Kunc. The power of commuting with finite sets of words. Theory Comput. Syst., 40(4):521-551, 2007.
-
(2007)
Theory Comput. Syst
, vol.40
, Issue.4
, pp. 521-551
-
-
Kunc, M.1
-
28
-
-
34548072632
-
What do we know about language equations?
-
M. Kunc. What do we know about language equations? In Developments in Language Theory, pages 23-27, 2007.
-
(2007)
Developments in Language Theory
, pp. 23-27
-
-
Kunc, M.1
-
30
-
-
58049169957
-
Directed test generation using symbolic grammars
-
R. Majumdar and R.-G. Xu. Directed test generation using symbolic grammars. In Automated Software Engineering, pages 134-143, 2007.
-
(2007)
Automated Software Engineering
, pp. 134-143
-
-
Majumdar, R.1
Xu, R.-G.2
-
31
-
-
31744432699
-
Finding application errors and security flaws using PQL: A program query language
-
M. C. Martin, V. B. Livshits, and M. S. Lam. Finding application errors and security flaws using PQL: a program query language. In Object-Oriented Programming, Systems, Languages, and Applications, pages 365-383, 2005.
-
(2005)
Object-Oriented Programming, Systems, Languages, and Applications
, pp. 365-383
-
-
Martin, M.C.1
Livshits, V.B.2
Lam, M.S.3
-
33
-
-
0034852165
-
Chaff: Engineering an efficient SAT solver
-
M. W. Moskewicz, C. F. Madigan, Y. Zhao, L. Zhang, and S. Malik. Chaff: engineering an efficient SAT solver. In Design Automation Conference, pages 530-535, 2001.
-
(2001)
Design Automation Conference
, pp. 530-535
-
-
Moskewicz, M.W.1
Madigan, C.F.2
Zhao, Y.3
Zhang, L.4
Malik, S.5
-
34
-
-
33846482595
-
Conditional must not aliasing for static race detection
-
M. Naik and A. Aiken. Conditional must not aliasing for static race detection. In Principles of Programming Languages, pages 327-338, 2007.
-
(2007)
Principles of Programming Languages
, pp. 327-338
-
-
Naik, M.1
Aiken, A.2
-
35
-
-
0030685617
-
Proof-carrying code
-
New York, NY, USA, ACM
-
G. C. Necula. Proof-carrying code. In Principles of Programming Languages, pages 106-119, New York, NY, USA, 1997. ACM.
-
(1997)
Principles of Programming Languages
, pp. 106-119
-
-
Necula, G.C.1
-
36
-
-
84976700950
-
Simplification by cooperating decision procedures
-
G. Nelson and D. C. Oppen. Simplification by cooperating decision procedures. ACM Trans. Program. Lang. Syst., 1(2):245-257, 1979.
-
(1979)
ACM Trans. Program. Lang. Syst
, vol.1
, Issue.2
, pp. 245-257
-
-
Nelson, G.1
Oppen, D.C.2
-
37
-
-
34548118221
-
State complexity of combined operations
-
A. Salomaa, K. Salomaa, and S. Yu. State complexity of combined operations. Theor. Comput. Sci., 383(2-3):140-152, 2007.
-
(2007)
Theor. Comput. Sci
, vol.383
, Issue.2-3
, pp. 140-152
-
-
Salomaa, A.1
Salomaa, K.2
Yu, S.3
-
41
-
-
33745216482
-
The essence of command injection attacks in web applications
-
Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Principles of Programming Languages, pages 372-382, 2006.
-
(2006)
Principles of Programming Languages
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
42
-
-
29144520841
-
Grammar-based analysis of string expressions
-
New York, NY, USA, ACM
-
P. Thiemann. Grammar-based analysis of string expressions. In Workshop on Types in Languages Design and Implementation, pages 59-70, New York, NY, USA, 2005. ACM.
-
(2005)
Workshop on Types in Languages Design and Implementation
, pp. 59-70
-
-
Thiemann, P.1
-
43
-
-
35449004893
-
Sound and precise analysis of web applications for injection vulnerabilities
-
G. Wassermann and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. In Programming Language Design and Implementation, pages 32-41, 2007.
-
(2007)
Programming Language Design and Implementation
, pp. 32-41
-
-
Wassermann, G.1
Su, Z.2
-
45
-
-
57449103850
-
Dynamic test input generation for web applications
-
G. Wassermann, D. Yu, A. Chander, D. Dhurjati, H. Inamura, and Z. Su. Dynamic test input generation for web applications. In International Symposium on Software testing and analysis, pages 249-260, 2008.
-
(2008)
International Symposium on Software testing and analysis
, pp. 249-260
-
-
Wassermann, G.1
Yu, D.2
Chander, A.3
Dhurjati, D.4
Inamura, H.5
Su, Z.6
-
47
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
July
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Usenix Security Symposium, pages 179-192, July 2006.
-
(2006)
Usenix Security Symposium
, pp. 179-192
-
-
Xie, Y.1
Aiken, A.2
-
48
-
-
34249879570
-
Saturn: A scalable framework for error detection using boolean satisfiability
-
Y. Xie and A. Aiken. Saturn: A scalable framework for error detection using boolean satisfiability. ACM Trans. Program. Lang. Syst., 29(3):16, 2007.
-
(2007)
ACM Trans. Program. Lang. Syst
, vol.29
, Issue.3
, pp. 16
-
-
Xie, Y.1
Aiken, A.2
-
49
-
-
54249102273
-
Symbolic string verification: An automata-based approach
-
Berlin, Heidelberg, Springer-Verlag
-
F. Yu, T. Bultan, M. Cova, and O. H. Ibarra. Symbolic string verification: An automata-based approach. In SPIN '08: Proceedings of the 15th international workshop on Model Checking Software, pages 306-324, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
SPIN '08: Proceedings of the 15th international workshop on Model Checking Software
, pp. 306-324
-
-
Yu, F.1
Bultan, T.2
Cova, M.3
Ibarra, O.H.4
|