-
2
-
-
0034300446
-
Data dependence analysis of assembly code
-
AMME, W.,BRAUN, P., ZEHENDNER, E., AND THOMASSET, F. 2000. Data dependence analysis of assembly code. Int. J. Parall. Program. 28, 5, 431-467.
-
(2000)
Int. J. Parall. Program.
, vol.28
, Issue.5
, pp. 431-467
-
-
Amme, W.1
Braun, P.2
Zehendner, E.3
Thomasset, F.4
-
5
-
-
47249123725
-
WYSINWYX: What you see is not what you execute
-
Ph.D. thesis. Computer Science Department, University of Wisconsin, Madison, WI
-
BALAKRISHNAN, G. 2007. WYSINWYX: What You See Is Not What You eXecute. Ph.D. thesis, Tech. rep. 1603. Computer Science Department, University of Wisconsin, Madison, WI.
-
(2007)
Tech. Rep. 1603
-
-
Balakrishnan, G.1
-
6
-
-
36549028674
-
Codesurfer/x86 - A platform for analyzing x86 executables, (tool demonstration paper)
-
BALAKRISHNAN, G., GRUIAN, R., REPS, T., AND TEITELBAUM, T. 2005a. Codesurfer/x86 - A platform for analyzing x86 executables, (tool demonstration paper). In Proceedings of the International Conference on Compiler Construction.
-
(2005)
Proceedings of the International Conference on Compiler Construction
-
-
Balakrishnan, G.1
Gruian, R.2
Reps, T.3
Teitelbaum, T.4
-
11
-
-
33745788388
-
Model checking x86 executables with CodeSurfer/x86 and WPDS++
-
BALAKRISHNAN, G.,REPS, T.,KIDD, N.,LAL, A.,LIM, J.,MELSKI, D.,GRUIAN, R.,YONG, S.,CHEN, C.-H., AND TEITELBAUM, T. 2005b. Model checking x86 executables with CodeSurfer/x86 and WPDS++. In Proceedings of the Conference on Computer Aided Verification.
-
(2005)
Proceedings of the Conference on Computer Aided Verification
-
-
Balakrishnan, G.1
Reps, T.2
Kidd, N.3
Lal, A.4
Lim, J.5
Melski, D.6
Gruian, R.7
Yong, S.8
Chen, C.-H.9
Teitelbaum, T.10
-
12
-
-
33646744677
-
WYSINWYX: What you see is not what you execute
-
BALAKRISHNAN, G.,REPS, T.,MELSKI, D., AND TEITELBAUM, T. 2007. WYSINWYX: What you see is not what you execute. In Proceedings of the IFIP Working Conference on Verified Software: Theories, Tools, Experiments.
-
(2007)
Proceedings of the IFIP Working Conference on Verified Software: Theories, Tools, Experiments
-
-
Balakrishnan, G.1
Reps, T.2
Melski, D.3
Teitelbaum, T.4
-
13
-
-
34748831643
-
Thorough static analysis of device drivers
-
BALL, T., BOUNIMOVA, E., COOK, B., LEVIN, V., LICHTENBERG, J.,MCGARVEY, C., ONDRUSEK, B., RAJAMANI, S., AND USTUNER, A. 2006. Thorough static analysis of device drivers. In Proceedings of the European Conference on Computer Systems.
-
(2006)
Proceedings of the European Conference on Computer Systems
-
-
Ball, T.1
Bounimova, E.2
Cook, B.3
Levin, V.4
Lichtenberg, J.5
McGarvey, C.6
Ondrusek, B.7
Rajamani, S.8
Ustuner, A.9
-
14
-
-
84947232436
-
Bebop: A symbolic model checker for Boolean programs
-
Proceedings of the Spin Workshop. Springer
-
BALL, T. AND RAJAMANI, S. 2000. Bebop: A symbolic model checker for Boolean programs. In Proceedings of the Spin Workshop. Lecture Notes in Computer Science, vol.1885. Springer, 113-130.
-
(2000)
Lecture Notes in Computer Science
, vol.1885
, pp. 113-130
-
-
Ball, T.1
Rajamani, S.2
-
16
-
-
34250666936
-
Static detection of malicious code in executable programs
-
BERGERON, J., DEBBABI, M., DESHARNAIS, J., ERHIOUI, M., LAVOIE, Y., AND TAWBI, N. 2001. Static detection of malicious code in executable programs. Int. J. Req. Engin.
-
(2001)
Int. J. Req. Engin.
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
17
-
-
84860833874
-
Static analysis of binary code to isolate malicious behaviors
-
BERGERON, J.,DEBBABI,M.,ERHIOUI,M., ANDKTARI, B. 1999. Static analysis of binary code to isolate malicious behaviors. In Proceedings of the International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
-
(1999)
Proceedings of the International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
-
-
Bergeron, J.1
Debbabi, M.2
Erhioui, M.3
Ktari, B.4
-
18
-
-
0038039865
-
A static analyzer for large safety-critical software
-
BLANCHET, B., COUSOT, P., COUSOT, R., FERET, J.,MAUBORGNE, L.,MIŃE, A.,MONNIAUX, D., AND RIVAL, X. 2003. A static analyzer for large safety-critical software. In Proceedings of the Conference on Programming Language Design and Implementation. 196-207.
-
(2003)
Proceedings of the Conference on Programming Language Design and Implementation.
, pp. 196-207
-
-
Blanchet, B.1
Cousot, P.2
Cousot, R.3
Feret, J.4
Mauborgne, L.5
Mińe, A.6
Monniaux, D.7
Rival, X.8
-
20
-
-
84944083010
-
Efficient chaotic iteration strategies with widenings
-
Proceedings of the International Conference on Formal Methods in Programming and Their Application. Springer
-
BOURDONCLE, F. 1993. Efficient chaotic iteration strategies with widenings. In Proceedings of the International Conference on Formal Methods in Programming and Their Application. Lecture Notes in Computer Science. Springer.
-
(1993)
Lecture Notes in Computer Sciencex
-
-
Bourdoncle, F.1
-
22
-
-
35048903951
-
Alias analysis for assembly
-
School of Computer Science, Carnegie Mellon University, Pittsburgh, PA
-
BRUMLEY, D. AND NEWSOME, J. 2006. Alias analysis for assembly. Tech. rep. CMU-CS-06-180, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA.
-
(2006)
Tech. Rep. CMU-CS 06-180
-
-
Brumley, D.1
Newsome, J.2
-
23
-
-
0022769976
-
Graph-Based algorithms for Boolean function manipulation
-
BRYANT, R. 1986. Graph-Based algorithms for Boolean function manipulation. IEEE Trans. Comput. C-35, 6, 677-691.
-
(1986)
IEEE Trans. Comput. C-35
, vol.6
, pp. 677-691
-
-
Bryant, R.1
-
24
-
-
0025595038
-
Symbolic model checking: 1020 states and beyond
-
BURCH, J., CLARKE, E., MCMILLAN, K., DILL, D., AND HWANG, L. 1990. Symbolic model checking: 1020 states and beyond. In Proceedings of the Symposium on Logic in Computer Science. 428-439.
-
(1990)
Proceedings of the Symposium on Logic in Computer Science.
, pp. 428-439
-
-
Burch, J.1
Clarke, E.2
McMillan, K.3
Dill, D.4
Hwang, L.5
-
25
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
BUSH, W., PINCUS, J., AND SIELAFF, D. 2000. A static analyzer for finding dynamic programming errors. Softw. Pract. Exper. 30, 775-802.
-
(2000)
Softw. Pract. Exper.
, vol.30
, pp. 775-802
-
-
Bush, W.1
Pincus, J.2
Sielaff, D.3
-
26
-
-
35448929044
-
Certified self-modifying code
-
ACM Press, New York
-
CAI, H., SHAO, Z., AND VAYNBERG, A. 2007. Certified self-modifying code. In Proceedings of the Conference on Programming Language Design and Implementation. ACM Press, New York, 66-77.
-
(2007)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 66-77
-
-
Cai, H.1
Shao, Z.2
Vaynberg, A.3
-
30
-
-
0036041421
-
An empirical study of operating systems errors
-
CHOU, A., YANG, J., CHELF, B., HALLEM, S., AND ENGLER, D. 2001. An empirical study of operating systems errors. In Proceedings of the Symposium on Operating Systems Principles.
-
(2001)
Proceedings of the Symposium on Operating Systems Principles
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
32
-
-
24644447479
-
Interprocedural data flow recovery of high-level language code from assembly
-
University of Queensland
-
CIFUENTES, C. AND FRABOULET, A. 1997a. Interprocedural data flow recovery of high-level language code from assembly. Tech. rep. 421, University of Queensland.
-
(1997)
Tech. Rep. 421
-
-
Cifuentes, C.1
Fraboulet, A.2
-
35
-
-
84944406286
-
Counterexample-Guided abstraction refinement
-
CLARKE, E.,GRUMBERG, O.,JHA, S.,LU, Y., AND VEITH,H. 2000. Counterexample-Guided abstraction refinement. In Proceedings of the Conference on Computer Aided Verification. 154-169.
-
(2000)
Proceedings of the Conference on Computer Aided Verification.
, pp. 154-169
-
-
Clarke, E.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
36
-
-
47749137166
-
-
CODESONAR. GrammaTech, Inc.
-
CODESONAR. CodeSonar, GrammaTech, Inc. www.grammatech.com/products/ codesonar.
-
CodeSonar
-
-
-
37
-
-
84885626052
-
-
CODESURFER. GrammaTech, Inc.
-
CODESURFER. CodeSurfer, GrammaTech, Inc. www.grammatech.com/products/ codesurfer.
-
CodeSurfer
-
-
-
39
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
CORBETT, J.,DWYER, M.,HATCLIFF, J., LAUBACH, S., PASAREANU, C., ROBBY, AND ZHENG, H. 2000. Bandera: Extracting finite-state models from Java source code. In Proceedings of the International Conference on Software Engineering. 439-448.
-
(2000)
Proceedings of the International Conference on Software Engineering.
, pp. 439-448
-
-
Corbett, J.1
Dwyer, M.2
Hatcliff, J.3
Laubach, S.4
Robby, P.C.5
Zheng, H.6
-
40
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximation of fixed points
-
COUSOT, P. AND COUSOT, R. 1977. Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximation of fixed points. In Proceedings of the Symposium on Principles of Programming Language. 238-252.
-
(1977)
Proceedings of the Symposium on Principles of Programming Language.
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
43
-
-
38549173275
-
Static detection of vulnerabilities in x86 executables
-
COVA, M., FELMETSGER, V.,BANKS, G., AND VIGNA, G. 2006. Static detection of vulnerabilities in x86 executables. In Proceedings of the Annual Computer Security Applications Conference. COVERITY. Coverity Prevent. www.coverity.com/html/coverity-prevent-static-analysis.html.
-
(2006)
Proceedings of the Annual Computer Security Applications Conference. COVERITY. Coverity Prevent.
-
-
Cova, M.1
Felmetsger, V.2
Banks, G.3
Vigna, G.4
-
44
-
-
0036040604
-
ESP: Path-Sensitive program verification in polynomial time
-
ACM Press, New York
-
DAS,M.,LERNER, S., AND SEIGLE,M. 2002. ESP: Path-Sensitive program verification in polynomial time. In Proceedings of the Conference on Programming Language Design and Implementation. ACM Press, New York, 57-68.
-
(2002)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 57-68
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
45
-
-
4544270923
-
On the static analysis of indirect control transfers in binaries
-
DE SUTTER, B., DE BUS, B., DE BOSSCHERE, K., KEYNGNAERT, P., AND DEMOEN, B. 2000. On the static analysis of indirect control transfers in binaries. In Proceedings of the International Confernece on Parallel and Distributed Processing Techniques and Applications.
-
(2000)
Proceedings of the International Confernece on Parallel and Distributed Processing Techniques and Applications
-
-
De Sutter, B.1
De Bus, B.2
De Bosschere, K.3
Keyngnaert, P.4
Demoen, B.5
-
46
-
-
47249138736
-
-
DEBRAY, S., LINN, C., ANDREWS, G., AND SCHWARZ, B. 2004. Stack analysis of x86 executables. www.cs.arizona.edu/?debray/Publications/stack-analysis.pdf.
-
(2004)
Stack Analysis of x86 Executables
-
-
Debray, S.1
Linn, C.2
Andrews, G.3
Schwarz, B.4
-
51
-
-
0032639214
-
Anno Domini: From type theory to year 2000 conversion tool
-
EIDORFF, P., HENGLEIN, F.,MOSSIN, C., NISS, H., SøRENSEN, M., AND TOFTE, M. 1999. Anno Domini: From type theory to year 2000 conversion tool. In Proceedings of the Symposium on Principles of Programming Language. 1-14.
-
(1999)
Proceedings of the Symposium on Principles of Programming Language.
, pp. 1-14
-
-
Eidorff, P.1
Henglein, F.2
Mossin, C.3
Niss, H.4
Sørensen, M.5
Tofte, M.6
-
52
-
-
47249089144
-
-
Ph.D. thesis, School of Information Technology and Electrical Engineering, University of Queensland, Brisbane, Australia
-
EMMERIK, M. V. 2007. Static single assignment for decompilation. Ph.D. thesis, School of Information Technology and Electrical Engineering, University of Queensland, Brisbane, Australia.
-
(2007)
Static Single Assignment for Decompilation
-
-
Emmerik, M.V.1
-
53
-
-
84975277890
-
Checking system rules using systemspecific, programmer-written compiler extensions
-
ENGLER, D., CHELF, B., CHOU, A., AND HALLEM, S. 2000. Checking system rules using systemspecific, programmer-written compiler extensions. In Proceedings of the Conference on Operating System Design and Implementation. 1-16.
-
(2000)
Proceedings of the Conference on Operating System Design and Implementation.
, pp. 1-16
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
54
-
-
33746063713
-
Modular verification of as- sembly code with stack-based control abstractions
-
FENG, X.,SHAO, Z.,VAYNBERG, A.,XIANG, S., ANDNI, Z. 2006. Modular verification of as- sembly code with stack-based control abstractions. In Proceedings of the Conference on Program Language Design and Implementation. 401-414.
-
(2006)
Proceedings of the Conference on Program Language Design and Implementation.
, pp. 401-414
-
-
Feng, X.1
Shao, Z.2
Vaynberg, A.3
Xiang, S.4
Andni, Z.5
-
55
-
-
77955641391
-
-
FERDINAND, C. 2009. Personal communication
-
FERDINAND, C. 2009. Personal communication.
-
-
-
-
56
-
-
84947261898
-
Reliable and precise WCET determination for a real-life processor
-
FERDINAND, C., HECKMANN, R., LANGENBACH, M., MARTIN, F., SCHMIDT, M., THEILING, H., THESING, S., AND WILHELM, R. 2001. Reliable and precise WCET determination for a real-life processor. In Proceedings of the 1st International Workshop on Embedded Software (EMSOFT'01). 469-485.
-
(2001)
Proceedings of the 1st International Workshop on Embedded Software (EMSOFT'01).
, pp. 469-485
-
-
Ferdinand, C.1
Heckmann, R.2
Langenbach, M.3
Martin, F.4
Schmidt, M.5
Theiling, H.6
Thesing, S.7
Wilhelm, R.8
-
61
-
-
84947441305
-
Construction of abstract state graphs with PVS
-
Proceedings of the Conference on Computer Aided Verification. Springer
-
GRAF, S. AND SÄIDI, H. 1997. Construction of abstract state graphs with PVS. In Proceedings of the Conference on Computer Aided Verification. Lecture Notes in Computer Science, vol.1254. Springer, 72-83.
-
(1997)
Lecture Notes in Computer Science
, vol.1254
, pp. 72-83
-
-
Graf, S.1
Säidi, H.2
-
63
-
-
33646750493
-
Practical and accurate low-level pointer analysis
-
GUO, B., BRIDGES, M., TRIANTAFYLLIS, S.,OTTONI, G., RAMAN, E., AND AUGUST, D. 2005. Practical and accurate low-level pointer analysis. In Proceedings of the 3rd International Symposium on Code Generation and Optimization. 291-302.
-
(2005)
Proceedings of the 3rd International Symposium on Code Generation and Optimization.
, pp. 291-302
-
-
Guo, B.1
Bridges, M.2
Triantafyllis, S.3
Ottoni, G.4
Raman, E.5
August, D.6
-
64
-
-
0031213092
-
Verification of real-time systems using linear relation analysis
-
HALBWACHS, N.,PROY, Y.-E., AND ROUMANOFF, P. 1997. Verification of real-time systems using linear relation analysis. Formal Methods Syst. Des. 11, 2, 157-185.
-
(1997)
Formal Methods Syst. Des.
, vol.11
, Issue.2
, pp. 157-185
-
-
Halbwachs, N.1
Proy, Y.-E.2
Roumanoff, P.3
-
66
-
-
2442623463
-
Abstractions from proofs
-
HENZINGER, T., JHALA, R.,MAJUMDAR, R., AND MCMILLAN, K. L. 2004. Abstractions from proofs. In Proceedings of the Symposium on Principles of Programming Language. 232-244.
-
(2004)
Proceedings of the Symposium on Principles of Programming Language.
, pp. 232-244
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
McMillan, K.L.4
-
67
-
-
0036041563
-
Lazy abstraction
-
HENZINGER, T., JHALA, R.,MAJUMDAR, R., AND SUTRE, G. 2002. Lazy abstraction. In Proceedings of the Symposium on Principles of Programming Language. 58-70.
-
(2002)
Proceedings of the Symposium on Principles of Programming Language.
, pp. 58-70
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
69
-
-
0019479434
-
Qualified data flow problems
-
HOLLEY, L. AND ROSEN, B. 1981. Qualified data flow problems. Trans. Softw. Engin. 7, 1, 60-78.
-
(1981)
Trans. Softw. Engin.
, vol.7
, Issue.1
, pp. 60-78
-
-
Holley, L.1
Rosen, B.2
-
70
-
-
33646742355
-
-
MSDN, Microsoft Corp., msdn2.microsoft.com/en-us/library/ms972826.aspx. IDAPRO. IDAPro disassembler
-
HOWARD, M. 2002. Some bad news and some good news. MSDN, Microsoft Corp., msdn2.microsoft.com/en-us/library/ms972826.aspx. IDAPRO. IDAPro disassembler. www.hex-rays.com/idapro/.
-
(2002)
Some Bad News and Some Good News
-
-
Howard, M.1
-
73
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
KRUEGEL, C.,KIRDA, E.,MUTZ, D.,ROBERTSON,W., AND VIGNA, G. 2005. Automating mimicry attacks using static binary analysis. In Proceedings of the USENIX Security Symposium.
-
(2005)
Proceedings of the USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
79
-
-
84958761896
-
Compactly representing first-order structures for static analysis
-
MANEVICH, R., RAMALINGAM, G., FIELD, J., GOYAL, D., AND SAGIV, M. 2002. Compactly representing first-order structures for static analysis. In Proceedings of the Static Analysis Symposium. 196-212.
-
(2002)
Proceedings of the Static Analysis Symposium.
, pp. 196-212
-
-
Manevich, R.1
Ramalingam, G.2
Field, J.3
Goyal, D.4
Sagiv, M.5
-
91
-
-
0003401511
-
Combining interprocedural pointer analysis and conditional constant propagation
-
IBM T.J. Watson Research Center
-
PIOLI, A. AND HIND, M. 1999. Combining interprocedural pointer analysis and conditional constant propagation. Tech. rep. RC 21532(96749), IBM T.J. Watson Research Center.
-
(1999)
Tech. Rep. RC 21532(96749)
-
-
Pioli, A.1
Hind, M.2
-
95
-
-
85014871817
-
Eliminating stack overflow by abstract interpretation
-
REGEHR, J., REID, A., AND WEBB, K. 2005. Eliminating stack overflow by abstract interpretation. ACM Trans. Embed. Comput. Syst. 4, 4, 751-778.
-
(2005)
ACM Trans. Embed. Comput. Syst.
, vol.4
, Issue.4
, pp. 751-778
-
-
Regehr, J.1
Reid, A.2
Webb, K.3
-
98
-
-
39049129781
-
A next-generation platform for analyzing executables
-
REPS, T., BALAKRISHNAN, G., LIM, J., AND TEITELBAUM, T. 2005. A next-generation platform for analyzing executables. In Proceedings of the Asian Symposium on Programming Languages and Systems.
-
(2005)
Proceedings of the Asian Symposium on Programming Languages and Systems
-
-
Reps, T.1
Balakrishnan, G.2
Lim, J.3
Teitelbaum, T.4
-
99
-
-
84976827167
-
Incremental context-dependent analysis for language-based editors
-
REPS, T., TEITELBAUM, T., AND DEMERS, A. 1983. Incremental context-dependent analysis for language-based editors. Trans. Program. Lang. Syst. 5, 3, 449-477.
-
(1983)
Trans. Program. Lang. Syst.
, vol.5
, Issue.3
, pp. 449-477
-
-
Reps, T.1
Teitelbaum, T.2
Demers, A.3
-
101
-
-
27844444121
-
Symbolic bounds analysis of pointers, array indices, and accessed memory regions
-
RUGINA, R. ANDRINARD,M. 2005. Symbolic bounds analysis of pointers, array indices, and accessed memory regions. Trans. Program. Lang. Syst. 27, 2, 185-235.
-
(2005)
Trans. Program. Lang. Syst.
, vol.27
, Issue.2
, pp. 185-235
-
-
Rugina, R.1
Rinard, M.2
-
102
-
-
0002823436
-
Two approaches to interprocedural data flow analysis
-
S. Muchnick and N. Jones, Eds. Prentice-Hall, Englewood Cliffs, NJ, Chapter 7
-
SHARIR, M. AND PNUELI, A. 1981. Two approaches to interprocedural data flow analysis. In Program Flow Analysis: Theory and Applications. S. Muchnick and N. Jones, Eds. Prentice-Hall, Englewood Cliffs, NJ, Chapter 7, 189-234.
-
(1981)
Program Flow Analysis: Theory and Applications
, pp. 189-234
-
-
Sharir, M.1
Pnueli, A.2
-
104
-
-
0004349103
-
Vulcan: Binary transformation in a distributed environment
-
SRIVASTAVA, A., EDWARDS, A., AND VO, H. 2001. Vulcan: Binary transformation in a distributed environment. MSR-TR-2001-2050, Microsoft Research.
-
(2001)
MSR-TR 2001-2050, Microsoft Research
-
-
Srivastava, A.1
Edwards, A.2
Vo, H.3
-
106
-
-
85077022007
-
Recovering device drivers
-
SWIFT, M., ANNAMALAI, M., BERSHAD, B., AND LEVY, H. 2004. Recovering device drivers. In Proceedings of the Symposium on Operating Systems Design and Implementation.
-
(2004)
Proceedings of the Symposium on Operating Systems Design and Implementation
-
-
Swift, M.1
Annamalai, M.2
Bershad, B.3
Levy, H.4
-
107
-
-
16644400693
-
Improving the reliability of commodity operating systems
-
SWIFT, M., BERSHAD, B., AND LEVY, H. 2005. Improving the reliability of commodity operating systems. ACM Trans. Comput. Syst. 23, 1.
-
(2005)
ACM Trans. Comput. Syst.
, vol.23
, pp. 1
-
-
Swift, M.1
Bershad, B.2
Levy, H.3
-
110
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
WAGNER, D., FOSTER, J., BREWER, E., AND AIKEN, A. 2000. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of the Conference on Network and Distributed Systems Security.
-
(2000)
Proceedings of the Conference on Network and Distributed Systems Security
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
111
-
-
0343216869
-
Systems for late code modification
-
R. Giegerich and S. Graham, Eds. Springer
-
WALL, D. 1992. Systems for late code modification. In Code Generation-Concepts, Tools, Techniques, R. Giegerich and S. Graham, Eds. Springer.
-
(1992)
Code Generation-Concepts, Tools, Techniques
-
-
Wall, D.1
-
113
-
-
77955595480
-
-
WHQL. blogs.msdn.com/oldnewthing/archive/2004/03/05/84469.aspx
-
WHQL. 2004. Defrauding the WHQL driver certification process. blogs.msdn.com/oldnewthing/archive/2004/03/05/84469.aspx.
-
(2004)
Defrauding the WHQL Driver Certification Process
-
-
-
114
-
-
77955597213
-
Enforceability
-
WIKIPEDIA: (in the United States). en.wikipedia.org/wiki/Software license agreement#Enforceability, Sept. 19
-
WIKIPEDIA: Enforceability. Software license agreement: Enforceability (in the United States). en.wikipedia.org/wiki/Software license agreement#Enforceability, Sept. 19, 2009.
-
(2009)
Software License Agreement: Enforceability
-
-
-
115
-
-
77955624394
-
WIKIPEDIA: Shrink-wrap and click-wrap licenses
-
en.wikipedia.org/wiki/Software license agreement#Shrink-wrap and clickwrap licenses, Sept. 19
-
WIKIPEDIA: shrink-wrap and click-wrap licenses. Software license agreement: Shrink-wrap and click-wrap licenses. en.wikipedia.org/wiki/Software license agreement#Shrink-wrap and clickwrap licenses, Sept. 19, 2009.
-
(2009)
Software License Agreement: Shrink-wrap and Click-wrap Licenses
-
-
-
116
-
-
43949126892
-
The worst-case execution-time problem-Overview of methods and survey of tools
-
WILHELM, R.,ENGBLOM, J.,ERMEDAHL, A.,HOLSTI, N., THESING, S.,WHALLEY, D.,BERNAT, G., FERDINAND, C., HECKMANN, R.,MITRA, T.,MUELLER, F., PUAUT, I., PUSCHNER, P., STASCHU- LAT, J., AND STENSTRÖM, P. 2008. The worst-case execution-time problem-Overview of methods and survey of tools. ACM Trans. Embed. Comput. Syst. 7, 3, 1-53.
-
(2008)
ACM Trans. Embed. Comput. Syst.
, vol.7
, Issue.3
, pp. 1-53
-
-
Wilhelm, R.1
Engblom, J.2
Ermedahl, A.3
Holsti, N.4
Thesing, S.5
Whalley, D.6
Bernat, G.7
Ferdinand, C.8
Heckmann, R.9
Mitra, T.10
Mueller, F.11
Puaut, I.12
Puschner, P.13
Staschu- Lat, J.14
Stenström, P.15
-
118
-
-
84858918449
-
-
Windows DDK
-
Windows DDK. 2003. Windows Server 2003 DDK. www.microsoft.com/whdc/ devtools/ddk.
-
(2003)
Windows Server 2003 DDK
-
-
|