-
1
-
-
38149133882
-
OpenFst: A general and efficient weighted finite-state transducer library
-
Holub, J., Žďárek, J. (eds.) CIAA 2007. Springer, Heidelberg
-
Allauzen, C., Riley, M., Schalkwyk, J., Skut, W., Mohri, M.: OpenFst: A general and efficient weighted finite-state transducer library. In: Holub, J., Žďárek, J. (eds.) CIAA 2007. LNCS, vol. 4783, pp. 11-23. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4783
, pp. 11-23
-
-
Allauzen, C.1
Riley, M.2
Schalkwyk, J.3
Skut, W.4
Mohri, M.5
-
2
-
-
69149105622
-
Adding nesting structure to words
-
Alur, R., Madhusudan, P.: Adding nesting structure to words. JACM 56 (2009)
-
(2009)
JACM
, vol.56
-
-
Alur, R.1
Madhusudan, P.2
-
3
-
-
47249123745
-
Analyzing stripped device-driver executables
-
Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. Springer, Heidelberg
-
Balakrishnan, G., Reps, T.: Analyzing stripped device-driver executables. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 124-140. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4963
, pp. 124-140
-
-
Balakrishnan, G.1
Reps, T.2
-
4
-
-
26444538294
-
Model checking x86 executables with CodeSurfer/x86 andWPDS++
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
Balakrishnan, G., Reps, T., Kidd, N., Lal, A., Lim, J., Melski, D., Gruian, R., Yong, S., Chen, C.-H., Teitelbaum, T.: Model checking x86 executables with CodeSurfer/x86 andWPDS++. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 158-163. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3576
, pp. 158-163
-
-
Balakrishnan, G.1
Reps, T.2
Kidd, N.3
Lal, A.4
Lim, J.5
Melski, D.6
Gruian, R.7
Yong, S.8
Chen, C.-H.9
Teitelbaum, T.10
-
5
-
-
70350760682
-
The SLAM toolkit
-
Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. Springer, Heidelberg
-
Ball, T., Rajamani, S.: The SLAM toolkit. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, p. 260. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2102
, pp. 260
-
-
Ball, T.1
Rajamani, S.2
-
6
-
-
50549094769
-
Proofs from tests
-
Beckman, N., Nori, A., Rajamani, S., Simmons, R.: Proofs from tests. In: ISSTA (2008)
-
(2008)
ISSTA
-
-
Beckman, N.1
Nori, A.2
Rajamani, S.3
Simmons, R.4
-
7
-
-
77954996346
-
Automatically identifying trigger-based behavior in malware
-
Springer, Heidelberg
-
Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Poosankam, P., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Botnet Detection. Springer, Heidelberg (2008)
-
(2008)
Botnet Detection
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Poosankam, P.5
Song, D.6
Yin, H.7
-
8
-
-
77954963200
-
Static detection of vulnerabilities in x86 executables
-
Jesshope, C., Egan, C. (eds.) ACSAC 2006. Springer, Heidelberg
-
Cova, M., Felmetsger, V., Banks, G., Vigna, G.: Static detection of vulnerabilities in x86 executables. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4186
-
-
Cova, M.1
Felmetsger, V.2
Banks, G.3
Vigna, G.4
-
9
-
-
35348872682
-
The Daikon system for dynamic detection of likely invariants
-
Ernst, M., Perkins, J., Guo, P., McCamant, S., Pacheco, C., Tschantz, M., Xiao, C.: The Daikon system for dynamic detection of likely invariants. SCP 69 (2007)
-
(2007)
SCP
, vol.69
-
-
Ernst, M.1
Perkins, J.2
Guo, P.3
McCamant, S.4
Pacheco, C.5
Tschantz, M.6
Xiao, C.7
-
10
-
-
31844450371
-
DART: Directed automated random testing
-
Godefroid, P., Klarlund, N., Sen, K.: DART: Directed automated random testing. In: PLDI (2005)
-
(2005)
PLDI
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
12
-
-
77950894390
-
Compositional may-must program analysis: Unleashing the power of alternation
-
Godefroid, P., Nori, A., Rajamani, S., Tetali, S.: Compositional may-must program analysis: Unleashing the power of alternation. In: POPL (2010)
-
(2010)
POPL
-
-
Godefroid, P.1
Nori, A.2
Rajamani, S.3
Tetali, S.4
-
13
-
-
34547150779
-
SYNERGY: A new algorithm for property checking
-
Robshaw, M.J.B. (ed.) FSE 2006. Springer, Heidelberg
-
Gulavani, B., Henzinger, T., Kannan, Y., Nori, A., Rajamani, S.: SYNERGY: A new algorithm for property checking. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 117-127. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
, pp. 117-127
-
-
Gulavani, B.1
Henzinger, T.2
Kannan, Y.3
Nori, A.4
Rajamani, S.5
-
15
-
-
0036041563
-
Lazy abstraction
-
Henzinger, T., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. In: POPL (2002)
-
(2002)
POPL
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
17
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Automating mimicry attacks using static binary analysis. In: USENIX Sec. Symp. (2005)
-
USENIX Sec. Symp. (2005)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
19
-
-
47249102174
-
A system for generating static analyzers for machine instructions
-
Hendren, L. (ed.) CC 2008. Springer, Heidelberg
-
Lim, J., Reps, T.: A system for generating static analyzers for machine instructions. In: Hendren, L. (ed.) CC 2008. LNCS, vol. 4959, pp. 36-52. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4959
, pp. 36-52
-
-
Lim, J.1
Reps, T.2
-
20
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS (2003)
-
(2003)
CCS
-
-
Linn, C.1
Debray, S.2
-
21
-
-
24644519584
-
Analysis of modular arithmetic
-
Sagiv, M. (ed.) ESOP 2005. Springer, Heidelberg
-
Müller-Olm, M., Seidl, H.: Analysis of modular arithmetic. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 46-60. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3444
, pp. 46-60
-
-
Müller-Olm, M.1
Seidl, H.2
-
22
-
-
0032682933
-
Aggregate structure identification and its application to program analysis
-
Ramalingam, G., Field, J., Tip, F.: Aggregate structure identification and its application to program analysis. In: POPL (1999)
-
(1999)
POPL
-
-
Ramalingam, G.1
Field, J.2
Tip, F.3
-
23
-
-
33749856410
-
Intermediate-representation recovery from low-level code
-
Reps, T., Balakrishnan, G., Lim, J.: Intermediate-representation recovery from low-level code. In: PEPM (2006)
-
(2006)
PEPM
-
-
Reps, T.1
Balakrishnan, G.2
Lim, J.3
-
24
-
-
0004349103
-
-
MSR-TR-2001-50, Microsoft Research April
-
Srivastava, A., Edwards, A., Vo, H.: Vulcan: Binary transformation in a distributed environment. MSR-TR-2001-50, Microsoft Research (April 2001)
-
(2001)
Vulcan: Binary Transformation in a Distributed Environment
-
-
Srivastava, A.1
Edwards, A.2
Vo, H.3
-
25
-
-
77955008363
-
-
TR 1669, UW-Madison April
-
Thakur, A., Lim, J., Lal, A., Burton, A., Driscoll, E., Elder, M., Andersen, T., Reps, T.: Directed proof generation for machine code. TR 1669, UW-Madison (April 2010)
-
(2010)
Directed Proof Generation for Machine Code
-
-
Thakur, A.1
Lim, J.2
Lal, A.3
Burton, A.4
Driscoll, E.5
Elder, M.6
Andersen, T.7
Reps, T.8
|