-
2
-
-
45849140560
-
The parma polyhedra library: Toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems
-
R. Bagnara, P. M. Hill, and E. Zaffanella. The Parma Polyhedra Library: Toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems. Science of Computer Programming, 72(1-2), 2008.
-
(2008)
Science of Computer Programming
, vol.72
, Issue.1-2
-
-
Bagnara, R.1
Hill, P.M.2
Zaffanella, E.3
-
3
-
-
0034818448
-
Automatic predicate abstraction of C programs
-
ACM
-
T. Ball, R. Majumdar, T. Millstein, and S. Rajamani. Automatic predicate abstraction of C programs. In Proc. ACM Conf. on Programming Language Design and Implementation (PLDI '01), pages 203-213. ACM, 2001.
-
(2001)
Proc. ACM Conf. on Programming Language Design and Implementation (PLDI '01)
, pp. 203-213
-
-
Ball, T.1
Majumdar, R.2
Millstein, T.3
Rajamani, S.4
-
7
-
-
0000975439
-
A polynomial time algorithm for counting integral points in polyhedra when the dimension is fixed
-
A. Barvinok. A Polynomial Time Algorithm for Counting Integral Points in Polyhedra when the Dimension is Fixed. Mathematics of Operations Research, 19:189-202, 1994.
-
(1994)
Mathematics of Operations Research
, vol.19
, pp. 189-202
-
-
Barvinok, A.1
-
8
-
-
0036037637
-
The complexity of approximating entropy
-
ACM
-
T. Batu, S. Dasgupta, R. Kumar, and R. Rubinfeld. The complexity of approximating entropy. In Proc. ACM Symp. on Theory of Computing (STOC '02), pages 678-687. ACM, 2002.
-
(2002)
Proc. ACM Symp. on Theory of Computing (STOC '02)
, pp. 678-687
-
-
Batu, T.1
Dasgupta, S.2
Kumar, R.3
Rubinfeld, R.4
-
9
-
-
0038039865
-
A static analyzer for large safety-critical software
-
ACM
-
B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, D. Monniaux, and X. Rival. A static analyzer for large safety-critical software. In Proc. ACM Conf. on Programming Language Design and Implementation (PLDI'03), pages 196-207. ACM, 2003.
-
(2003)
Proc. ACM Conf. on Programming Language Design and Implementation (PLDI'03)
, pp. 196-207
-
-
Blanchet, B.1
Cousot, P.2
Cousot, R.3
Feret, J.4
Mauborgne, L.5
Miné, A.6
Monniaux, D.7
Rival, X.8
-
10
-
-
58449115871
-
BitScope: Automatically dissecting malicious binaries
-
Carnegie Mellon University
-
D. Brumley, C. Hartwig, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and D. Song. BitScope: Automatically dissecting malicious binaries. Technical Report CS-07-133, School of Computer Science, Carnegie Mellon University, 2007.
-
(2007)
Technical Report CS-07-133, School of Computer Science
-
-
Brumley, D.1
Hartwig, C.2
Kang, M.G.3
Liang, Z.4
Newsome, J.5
Poosankam, P.6
Song, D.7
-
11
-
-
55949090271
-
Theory and techniques for automatic generation of vulnerabilitybased signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Theory and techniques for automatic generation of vulnerabilitybased signatures. IEEE Trans. Dependable Sec. Comput., 5(4):224-241, 2008.
-
(2008)
IEEE Trans. Dependable Sec. Comput.
, vol.5
, Issue.4
, pp. 224-241
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
14
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative Information Flow, Relations and Polymorphic Types. J. Log. Comput., 18(2):181-199, 2005.
-
(2005)
J. Log. Comput.
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
15
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
17
-
-
0001760770
-
Information transmission in sequential programs
-
Academic Press
-
E. Cohen. Information Transmission in Sequential Programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.1
-
18
-
-
76549126778
-
Finding heap-bounds for hardware synthesis
-
IEEE
-
B. Cook, A. Gupta, S. Magill, A. Rybalchenko, J. Simsa, and V. Vafeiadis. Finding heap-bounds for hardware synthesis. In Proc. Intl. Conf. on Formal Methods in Computer-Aided Design (FMCAD '09), pages 205-212. IEEE, 2009.
-
(2009)
Proc. Intl. Conf. on Formal Methods in Computer-Aided Design (FMCAD '09)
, pp. 205-212
-
-
Cook, B.1
Gupta, A.2
Magill, S.3
Rybalchenko, A.4
Simsa, J.5
Vafeiadis, V.6
-
19
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
ACM
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. ACM Symp. on Principles of Programming Languages (POPL '77), pages 238-252. ACM, 1977.
-
(1977)
Proc. ACM Symp. on Principles of Programming Languages (POPL '77)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
23
-
-
24144461208
-
Software model checking: The VeriSoft approach
-
P. Godefroid. Software model checking: The VeriSoft approach. Formal Methods in System Design, 26(2):77-101, 2005.
-
(2005)
Formal Methods in System Design
, vol.26
, Issue.2
, pp. 77-101
-
-
Godefroid, P.1
-
25
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J. W. Gray. Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security, 1(3- 4):255-294, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.3-4
, pp. 255-294
-
-
Gray, J.W.1
-
27
-
-
1442287648
-
Abstractions from proofs
-
ACM
-
T. A. Henzinger, R. Jhala, R. Majumdar, and K. L. McMillan. Abstractions from proofs. In Proc. ACM Symp. on Principles of Programming Languages (POPL '04), pages 232-244. ACM, 2004.
-
(2004)
Proc. ACM Symp. on Principles of Programming Languages (POPL '04)
, pp. 232-244
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
McMillan, K.L.4
-
28
-
-
70350592315
-
Apron: A library of numerical abstract domains for static analysis
-
LNCS, Springer
-
B. Jeannet and A. Miné. Apron: A library of numerical abstract domains for static analysis. In Proc. Intl. Conf. on Computer Aided Verification (CAV '09), LNCS 5643, pages 661-667. Springer, 2009.
-
(2009)
Proc. Intl. Conf. on Computer Aided Verification (CAV '09)
, vol.5643
, pp. 661-667
-
-
Jeannet, B.1
Miné, A.2
-
29
-
-
84943632039
-
Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems
-
LNCS, Springer
-
P. Kocher. Timing Attacks on Implementations of Diffie- Hellman, RSA, DSS, and Other Systems. In Proc. Annual Intl. Cryptology Conference (CRYPTO '96), LNCS 1109, pages 104-113. Springer, 1996.
-
(1996)
Proc. Annual Intl. Cryptology Conference (CRYPTO '96)
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
33
-
-
58449099696
-
Subpolyhedra: A (more) scalable approach to infer linear inequalities
-
LNCS, Springer
-
V. Laviron and F. Logozzo. Subpolyhedra: A (more) scalable approach to infer linear inequalities. In Intl. Conf. on Verification, Model Checking, and Abstract Interpretation (VMCAI '09), LNCS 5403, pages 229-244. Springer, 2009.
-
(2009)
Intl. Conf. on Verification, Model Checking, and Abstract Interpretation (VMCAI '09)
, vol.5403
, pp. 229-244
-
-
Laviron, V.1
Logozzo, F.2
-
34
-
-
70449664685
-
-
Online; accessed 08-Nov-2008
-
J. A. D. Loera, D. Haws, R. Hemmecke, P. Huggins, J. Tauzer, and R. Yoshida. LattE. http://www.math.ucdavis.edu/̃latte/[Online; accessed 08-Nov-2008].
-
LattE
-
-
Loera, J.A.D.1
Haws, D.2
Hemmecke, R.3
Huggins, P.4
Tauzer, J.5
Yoshida, R.6
-
44
-
-
84856043672
-
A mathematical theory of communication
-
623-656, July and October
-
C. E. Shannon. A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656, July and October 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
|