-
1
-
-
0025444592
-
The program dependence web: A representation supporting control-, data-, and demand-driven interpretation of imperative languages
-
R. A. Ballance, A. B. Maccabe, and K. J. Ottenstein. The program dependence web: A representation supporting control-, data-, and demand-driven interpretation of imperative languages. In Proceedings of the ACM SIGPLAN'90 Conference on Programming Language Design and Implementation, pages 257-271, 1990.
-
(1990)
Proceedings of the ACM SIGPLAN'90 Conference on Programming Language Design and Implementation
, pp. 257-271
-
-
Ballance, R.A.1
Maccabe, A.B.2
Ottenstein, K.J.3
-
4
-
-
0034440476
-
Using meta-level compilation to check FLASH protocol code
-
A. Chou, B. Chelf, D. Engler, and M. Heinrich. Using meta-level compilation to check FLASH protocol code. In Proceedings of Architectural Support for Programming Languages and Operating Systems, pages 59-70, 2000.
-
(2000)
Proceedings of Architectural Support for Programming Languages and Operating Systems
, pp. 59-70
-
-
Chou, A.1
Chelf, B.2
Engler, D.3
Heinrich, M.4
-
5
-
-
84957700098
-
Effective representation of aliases and indirect memory operations in SSA form
-
F. C. Chow, S. Chan, S.-M. Liu, R. Lo, and M. Streich. Effective representation of aliases and indirect memory operations in SSA form. In Proceedings of the Sixth International Conference on Compiler Construction, pages 253-267, 1996.
-
(1996)
Proceedings of the Sixth International Conference on Compiler Construction
, pp. 253-267
-
-
Chow, F.C.1
Chan, S.2
Liu, S.-M.3
Lo, R.4
Streich, M.5
-
7
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
October
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, 13(4):451-490, October 1991.
-
(1991)
ACM Transactions on Programming Languages and Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
11
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of the ACM Conference on Operating Systems Design and Implementation, pages 1-16, 2000.
-
(2000)
Proceedings of the ACM Conference on Operating Systems Design and Implementation
, pp. 1-16
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
12
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
DOI 10.1109/52.976940
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19(1):42-51, 2002. (Pubitemid 34069369)
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
15
-
-
0032690376
-
SUIF explorer: An interactive and interprocedural parallelizer
-
S.-W. Liao, A. Diwan, R.P. Bosch, A. Ghuloum, and M. Lam. SUIF explorer: An interactive and interprocedural parallelizer. In Proceedings of the 26th Annual ACM Symposium on Principles of Programming Languages, pages 37-48, 1999.
-
(1999)
Proceedings of the 26th Annual ACM Symposium on Principles of Programming Languages
, pp. 37-48
-
-
Liao, S.-W.1
Diwan, A.2
Bosch, R.P.3
Ghuloum, A.4
Lam, M.5
-
18
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the 10th USENIX Security Symposium, pages 201-220, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
19
-
-
77954491462
-
-
Secure Software. RATS, a scanning tool. http://www.securesoftware.com/ rats.
-
RATS, a Scanning Tool
-
-
-
23
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of Network and Distributed Systems Security Symposium, pages 3-17, 2000.
-
(2000)
Proceedings of Network and Distributed Systems Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
24
-
-
0033203864
-
Compositional pointer and escape analysis for Java programs
-
J. Whaley and M. Rinard. Compositional pointer and escape analysis for Java programs. In Proceedings of Object-oriented Programming, Systems, Languages, and Applications, pages 187-206, 1999.
-
(1999)
Proceedings of Object-oriented Programming, Systems, Languages, and Applications
, pp. 187-206
-
-
Whaley, J.1
Rinard, M.2
|