메뉴 건너뛰기




Volumn , Issue , 2009, Pages 188-198

A decision procedure for subset constraints over regular languages

Author keywords

Algorithms; Languages; Theory; Verification

Indexed keywords

CONSTRAINT SOLVERS; CORRECTNESS PROOFS; DECISION PROCEDURE; LANGUAGES; PROGRAM ANALYSIS; REGULAR LANGUAGES; REGULAR-EXPRESSION MATCHING; SATISFYING ASSIGNMENTS; SQL INJECTION; SYSTEMS OF EQUATIONS; TESTING FRAMEWORK;

EID: 70450267483     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1542476.1542498     Document Type: Conference Paper
Times cited : (37)

References (50)
  • 2
    • 33745893080 scopus 로고    scopus 로고
    • Regular language matching and other decidable cases of the satisfiability problem for constraints between regular open terms
    • S. Bala. Regular language matching and other decidable cases of the satisfiability problem for constraints between regular open terms. In STACS, pages 596-607, 2004.
    • (2004) STACS , pp. 596-607
    • Bala, S.1
  • 3
    • 35048904185 scopus 로고    scopus 로고
    • Zapato: Automatic theorem proving for predicate abstraction refinement
    • T. Ball, B. Cook, S. K. Lahiri, and L. Zhang. Zapato: Automatic theorem proving for predicate abstraction refinement. In Computer Aided Verification, pages 457-461, 2004.
    • (2004) Computer Aided Verification , pp. 457-461
    • Ball, T.1    Cook, B.2    Lahiri, S.K.3    Zhang, L.4
  • 4
    • 1442339050 scopus 로고    scopus 로고
    • From symptom to cause: Localizing errors in counterexample traces
    • T. Ball, M. Naik, and S. K. Rajamani. From symptom to cause: localizing errors in counterexample traces. SIGPLAN Not., 38(1):97-105, 2003.
    • (2003) SIGPLAN Not , vol.38 , Issue.1 , pp. 97-105
    • Ball, T.1    Naik, M.2    Rajamani, S.K.3
  • 5
    • 84894630000 scopus 로고    scopus 로고
    • Automatically validating temporal safety properties of interfaces
    • May
    • T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN Workshop on Model Checking of Software, pages 103-122, May 2001.
    • (2001) SPIN Workshop on Model Checking of Software , pp. 103-122
    • Ball, T.1    Rajamani, S.K.2
  • 8
    • 67650854428 scopus 로고    scopus 로고
    • British Broadcasting Corporation, Aug
    • British Broadcasting Corporation. UN's website breached by hackers. In http://news.bbc.co.uk/2/hi/technology/6943385.stm, Aug. 2007.
    • (2007) UN's website breached by hackers
  • 12
    • 0023965424 scopus 로고
    • The calculus of constructions
    • T. Coquand and G. P. Huet. The calculus of constructions. Inf. Comput., 76(2/3):95-120, 1988.
    • (1988) Inf. Comput , vol.76 , Issue.2-3 , pp. 95-120
    • Coquand, T.1    Huet, G.P.2
  • 14
    • 24944448541 scopus 로고    scopus 로고
    • Simplify: A theorem prover for program checking
    • D. Detlefs, G. Nelson, and J. B. Saxe. Simplify: a theorem prover for program checking. J. ACM, 52(3):365-473, 2005.
    • (2005) J. ACM , vol.52 , Issue.3 , pp. 365-473
    • Detlefs, D.1    Nelson, G.2    Saxe, J.B.3
  • 15
    • 38149088089 scopus 로고    scopus 로고
    • A decision procedure for bit-vectors and arrays
    • V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In Computer-Aided Verification, pages 519-531, 2007.
    • (2007) Computer-Aided Verification , pp. 519-531
    • Ganesh, V.1    Dill, D.L.2
  • 21
    • 84870642502 scopus 로고    scopus 로고
    • Cross-site scripting: Attackers' new favorite flaw
    • Technical report, Sept
    • K. J. Higgins. Cross-site scripting: attackers' new favorite flaw. Technical report, http://www.darkreading.com/document.asp?doc-id=103774&WT. svl=news1-1, Sept. 2006.
    • (2006)
    • Higgins, K.J.1
  • 24
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In Symposium on Security and Privacy, pages 258-263, 2006.
    • (2006) Symposium on Security and Privacy , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 25
    • 84869674048 scopus 로고    scopus 로고
    • A. Kieżun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst. HAMPI: A solver for string constraints. technical report, Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory
    • A. Kieżun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst. HAMPI: A solver for string constraints. technical report, Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory.
  • 26
    • 33646044421 scopus 로고    scopus 로고
    • Banshee: A scalable constraint-based analysis toolkit
    • J. Kodumal and A. Aiken. Banshee: A scalable constraint-based analysis toolkit. In Static Analysis Symposium, pages 218-234, 2005.
    • (2005) Static Analysis Symposium , pp. 218-234
    • Kodumal, J.1    Aiken, A.2
  • 27
    • 34547231669 scopus 로고    scopus 로고
    • The power of commuting with finite sets of words
    • M. Kunc. The power of commuting with finite sets of words. Theory Comput. Syst., 40(4):521-551, 2007.
    • (2007) Theory Comput. Syst , vol.40 , Issue.4 , pp. 521-551
    • Kunc, M.1
  • 28
    • 34548072632 scopus 로고    scopus 로고
    • What do we know about language equations?
    • M. Kunc. What do we know about language equations? In Developments in Language Theory, pages 23-27, 2007.
    • (2007) Developments in Language Theory , pp. 23-27
    • Kunc, M.1
  • 30
    • 58049169957 scopus 로고    scopus 로고
    • Directed test generation using symbolic grammars
    • R. Majumdar and R.-G. Xu. Directed test generation using symbolic grammars. In Automated Software Engineering, pages 134-143, 2007.
    • (2007) Automated Software Engineering , pp. 134-143
    • Majumdar, R.1    Xu, R.-G.2
  • 34
    • 33846482595 scopus 로고    scopus 로고
    • Conditional must not aliasing for static race detection
    • M. Naik and A. Aiken. Conditional must not aliasing for static race detection. In Principles of Programming Languages, pages 327-338, 2007.
    • (2007) Principles of Programming Languages , pp. 327-338
    • Naik, M.1    Aiken, A.2
  • 35
    • 0030685617 scopus 로고    scopus 로고
    • Proof-carrying code
    • New York, NY, USA, ACM
    • G. C. Necula. Proof-carrying code. In Principles of Programming Languages, pages 106-119, New York, NY, USA, 1997. ACM.
    • (1997) Principles of Programming Languages , pp. 106-119
    • Necula, G.C.1
  • 36
    • 84976700950 scopus 로고
    • Simplification by cooperating decision procedures
    • G. Nelson and D. C. Oppen. Simplification by cooperating decision procedures. ACM Trans. Program. Lang. Syst., 1(2):245-257, 1979.
    • (1979) ACM Trans. Program. Lang. Syst , vol.1 , Issue.2 , pp. 245-257
    • Nelson, G.1    Oppen, D.C.2
  • 37
    • 34548118221 scopus 로고    scopus 로고
    • State complexity of combined operations
    • A. Salomaa, K. Salomaa, and S. Yu. State complexity of combined operations. Theor. Comput. Sci., 383(2-3):140-152, 2007.
    • (2007) Theor. Comput. Sci , vol.383 , Issue.2-3 , pp. 140-152
    • Salomaa, A.1    Salomaa, K.2    Yu, S.3
  • 38
  • 41
    • 33745216482 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Principles of Programming Languages, pages 372-382, 2006.
    • (2006) Principles of Programming Languages , pp. 372-382
    • Su, Z.1    Wassermann, G.2
  • 43
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • G. Wassermann and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. In Programming Language Design and Implementation, pages 32-41, 2007.
    • (2007) Programming Language Design and Implementation , pp. 32-41
    • Wassermann, G.1    Su, Z.2
  • 47
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • July
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Usenix Security Symposium, pages 179-192, July 2006.
    • (2006) Usenix Security Symposium , pp. 179-192
    • Xie, Y.1    Aiken, A.2
  • 48
    • 34249879570 scopus 로고    scopus 로고
    • Saturn: A scalable framework for error detection using boolean satisfiability
    • Y. Xie and A. Aiken. Saturn: A scalable framework for error detection using boolean satisfiability. ACM Trans. Program. Lang. Syst., 29(3):16, 2007.
    • (2007) ACM Trans. Program. Lang. Syst , vol.29 , Issue.3 , pp. 16
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.