-
8
-
-
0033697422
-
BANDERA: Extracting finite-state models from Java source code
-
Limerick, Ireland, June
-
J. Corbett, M. Dwyer, J. Hatcliff, C. Pasareanu, Robby, S. Laubach, and H. Zheng. BANDERA: extracting finite-state models from Java source code. In 22nd International Conference on Software Engineering (ICSE), Limerick, Ireland, June 2000.
-
(2000)
22nd International Conference on Software Engineering (ICSE)
-
-
Corbett, J.1
Dwyer, M.2
Hatcliff, J.3
Pasareanu, C.4
Robby, S.L.5
Zheng, H.6
-
9
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2000.
-
(2000)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
13
-
-
33745958405
-
Applying flow-sensitive cqual to verify minix authorization check placement
-
New York, NY, USA
-
T. Fraser, J. Nick L. Petroni, and W. A. Arbaugh. Applying flow-sensitive cqual to verify minix authorization check placement. In PLAS '06: Proceedings of the 2006 workshop on Programming languages and analysis for security, New York, NY, USA, 2006.
-
(2006)
PLAS '06: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security
-
-
Fraser, T.1
Petroni, N.J.L.2
Arbaugh, W.A.3
-
14
-
-
33751060933
-
Retrofitting legacy code for authorization policy enforcement
-
Oakland, California, USA, May
-
V. Ganapathy, T. Jaeger, and S. Jha. Retrofitting legacy code for authorization policy enforcement. In SP'06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2006.
-
(2006)
SP'06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Ganapathy, V.1
Jaeger, T.2
Jha, S.3
-
15
-
-
34548734722
-
Mining security sensitive operations in legacy code using concept analysis
-
Minneapolis, Minnesota, USA, May
-
V. Ganapathy, D. King, T. Jaeger, and S. Jha. Mining security sensitive operations in legacy code using concept analysis. In ICSE'07: Proceedings of the 29th International Conference on Software Engineering, Minneapolis, Minnesota, USA, May 2007.
-
(2007)
ICSE'07: Proceedings of the 29th International Conference on Software Engineering
-
-
Ganapathy, V.1
King, D.2
Jaeger, T.3
Jha, S.4
-
17
-
-
21644479380
-
Temporal-safety proofs for systems code
-
T. A. Henzinger, R. Jhala, R. Majumdar, G. C. Necula, G. Sutre, and W. Weimer. Temporal-safety proofs for systems code. In Computer Aided Verification CAV, 2002.
-
(2002)
Computer Aided Verification CAV
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Necula, G.C.4
Sutre, G.5
Weimer, W.6
-
20
-
-
0038108908
-
Access rights analysis for Java
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access rights analysis for Java. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2002), 2002.
-
(2002)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2002)
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
21
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In USENIX Security Symposium, 2001.
-
(2001)
USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
23
-
-
0001554809
-
PVS: Combining specification, proof checking, and model checking
-
New Brunswick, NJ
-
S. Owre, S. Rajan, J. Rushby, N. Shankar, and M. Srivas. PVS: Combining specification, proof checking, and model checking. In Computer-Aided Verification, CAV '96, New Brunswick, NJ, 1996.
-
(1996)
Computer-Aided Verification, CAV '96
-
-
Owre, S.1
Rajan, S.2
Rushby, J.3
Shankar, N.4
Srivas, M.5
-
25
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and S. M. D. The protection of information in computer systems. proceedings of the IEEE, September 1975.
-
(1975)
Proceedings of the IEEE
-
-
Saltzer, J.1
-
26
-
-
21644444136
-
Model carrying code: A practical approach for safe execution of untrusted applications
-
R. Sekar, V. N. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model carrying code: A practical approach for safe execution of untrusted applications. In ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
(2003)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Sekar, R.1
Venkatakrishnan, V.N.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.C.5
-
28
-
-
0001956132
-
SOOT - A Java optimization framework
-
R. Vallée-Rai and L. H. et al. SOOT - a Java optimization framework. In Proceedings of CASCON 1999, pages 125-135, 1999.
-
(1999)
Proceedings of CASCON 1999
, pp. 125-135
-
-
Vallée-Rai, R.1
|