-
1
-
-
85011293817
-
LCLint: A tool for using specifications to check code
-
D. Evans, J. Guttag, J. Horning, and Y.-M. Tan, "LCLint: A Tool for Using Specifications to Check Code", Proc. Second ACM SIGSOFT Symp. Foundations Software Eng., 1994.
-
(1994)
Proc. Second ACM SIGSOFT Symp. Foundations Software Eng.
-
-
Evans, D.1
Guttag, J.2
Horning, J.3
Tan, Y.-M.4
-
2
-
-
0032639445
-
Dynamically discovering likely program invariants to support program evolution
-
M. D. Ernst, J. Cockrell, W. G. Griswold, and D. Notkin, "Dynamically Discovering Likely Program Invariants to Support Program Evolution", Proc. 21st Int'l Conf. Software Eng., 1999.
-
(1999)
Proc. 21st Int'l Conf. Software Eng.
-
-
Ernst, M.D.1
Cockrell, J.2
Griswold, W.G.3
Notkin, D.4
-
4
-
-
1542359963
-
Characterization of linux kernel behavior under errors
-
W. Gu, Z. Kalbarczyk, R. Iyer, and Z. Yang, "Characterization of Linux Kernel Behavior under Errors", Proc. Int'l Conf. Dependable Systems Networks, 2003.
-
(2003)
Proc. Int'l Conf. Dependable Systems Networks
-
-
Gu, W.1
Kalbarczyk, Z.2
Iyer, R.3
Yang, Z.4
-
6
-
-
12344287173
-
Commercial fault tolerance: A tale of two systems
-
Jan.-Mar
-
L. Spainhower and W. Bartlett, "Commercial Fault Tolerance: A Tale of Two Systems", IEEE Trans. Dependable Secure Systems, vol. 1, no. 1, pp. 87-96, Jan.-Mar. 2004.
-
(2004)
IEEE Trans. Dependable Secure Systems
, vol.1
, Issue.1
, pp. 87-96
-
-
Spainhower, L.1
Bartlett, W.2
-
7
-
-
0036507790
-
Error detection by duplicated instructions in super-scalar processors
-
DOI 10.1109/24.994913, PII S0018952902026076
-
N. Oh, P. P. Shirvani, and E. J. McCluskey, "Error Detection by Duplicated Instructions in Super-Scalar Processors", IEEE Trans. Reliability, vol. 51, no. 1, pp. 63-75, Mar. 2002. (Pubitemid 34630924)
-
(2002)
IEEE Transactions on Reliability
, vol.51
, Issue.1
, pp. 63-75
-
-
Oh, N.1
Shirvani, P.P.2
McCluskey, E.J.3
-
8
-
-
33646829087
-
SWIFT: Software implemented fault tolerance
-
G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, and D. I. August, "SWIFT: Software Implemented Fault Tolerance", Proc. Int'l Symp. Code Generation Optimization, 2005.
-
(2005)
Proc. Int'l Symp. Code Generation Optimization
-
-
Reis, G.A.1
Chang, J.2
Vachharajani, N.3
Rangan, R.4
August, D.I.5
-
9
-
-
33750920644
-
Recent advances and new avenues in hardware-level reliability support
-
Nov./Dec
-
R. K. Iyer, N. M. Nakka, Z. T. Kalbarczyk, and S. Mitra, "Recent Advances and New Avenues in Hardware-Level Reliability Support", IEEE Micro, vol. 25, no. 6, pp. 18-29, Nov./Dec. 2005.
-
(2005)
IEEE Micro
, vol.25
, Issue.6
, pp. 18-29
-
-
Iyer, R.K.1
Nakka, N.M.2
Kalbarczyk, Z.T.3
Mitra, S.4
-
11
-
-
4544387534
-
An architectural framework for providing reliability and security support
-
N. Nakka, Z. Kalbarczyk, R. K. Iyer, and J. Xu, "An Architectural Framework for Providing Reliability and Security Support", Proc. Int'l Conf. Dependable Systems Networks, 2004.
-
(2004)
Proc. Int'l Conf. Dependable Systems Networks
-
-
Nakka, N.1
Kalbarczyk, Z.2
Iyer, R.K.3
Xu, J.4
-
12
-
-
33847696576
-
Toward application-aware security and reliability
-
Jan./Feb
-
R. K. Iyer, Z. Kalbarczyk, K. Pattabiraman, W. Healey, W.-M. W. Hwu, P. Klemperer, and R. Farivar, "Toward Application-Aware Security and Reliability", IEEE Security Privacy, vol. 5, no. 1, pp. 57-62, Jan./Feb. 2007.
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.1
, pp. 57-62
-
-
Iyer, R.K.1
Kalbarczyk, Z.2
Pattabiraman, K.3
Healey, W.4
Hwu, W.W.-M.5
Klemperer, P.6
Farivar, R.7
-
14
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Jan.-Mar
-
A. Avizienis, J. C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing", IEEE Trans. Dependable Secure Computing, vol. 1, no. 1, pp. 11-33, Jan.-Mar. 2004.
-
(2004)
IEEE Trans. Dependable Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.C.2
Randell, B.3
Landwehr, C.4
-
15
-
-
0026170711
-
Software defects and their impact on system availability-A study of field failures in operating systems
-
M. Sullivan and R. Chillarege, "Software Defects and Their Impact on System Availability-A Study of Field Failures in Operating Systems", Proc. 21st Symp. Fault-Tolerant Computing, 1991.
-
(1991)
Proc. 21st Symp. Fault-Tolerant Computing
-
-
Sullivan, M.1
Chillarege, R.2
-
16
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
W. R. Bush, J. D. Pincus, and D. J. Sielaff, "A Static Analyzer for Finding Dynamic Programming Errors", Software Practice Experience, vol. 30, no. 7, pp. 775-802, 2000.
-
(2000)
Software Practice Experience
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.R.1
Pincus, J.D.2
Sielaff, D.J.3
-
20
-
-
34547396006
-
Dynamic derivation of application-specific error detectors and their implementation in hardware
-
K. Pattabiraman, G. P. Saggese, D. Chen, Z. Kalbarczyk, and R. K. Iyer, "Dynamic Derivation of Application-Specific Error Detectors and Their Implementation in Hardware", Proc. Sixth European Dependable Computing Conf., 2006.
-
(2006)
Proc. Sixth European Dependable Computing Conf.
-
-
Pattabiraman, K.1
Saggese, G.P.2
Chen, D.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
21
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou, "PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code", Proc. 13th ACM SIGSOFT Int'l Symp. Foundations Software Eng., 2005.
-
(2005)
Proc. 13th ACM SIGSOFT Int'l Symp. Foundations Software Eng.
-
-
Li, Z.1
Zhou, Y.2
-
22
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf, "Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code", Proc. 18th ACM Symp. Operating Systems Principles, 2001.
-
(2001)
Proc. 18th ACM Symp. Operating Systems Principles
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
23
-
-
0034590511
-
A C/C++ source-to-source compiler for dependable applications
-
A. Benso, S. Chiusano, P. Prinetto, and L. Tagliaferri, "A C/C++ Source-to-Source Compiler for Dependable Applications", Proc. Int'l Conf. Dependable Systems Networks (Formerly FTCS-30 and DCCA-8), 2000.
-
(2000)
Proc. Int'l Conf. Dependable Systems Networks (Formerly FTCS-30 and DCCA-8)
-
-
Benso, A.1
Chiusano, S.2
Prinetto, P.3
Tagliaferri, L.4
-
24
-
-
1842638523
-
Java-MaC: A run-time assurance approach for java programs
-
M. Kim, M. Viswanathan, S. Kannan, I. Lee, and O. Sokolsky, "Java-MaC: A Run-Time Assurance Approach for Java Programs", Formal Methods System Design, vol. 24, no. 2, pp. 129-155, 2004.
-
(2004)
Formal Methods System Design
, vol.24
, Issue.2
, pp. 129-155
-
-
Kim, M.1
Viswanathan, M.2
Kannan, S.3
Lee, I.4
Sokolsky, O.5
-
25
-
-
11144354549
-
An overview of the runtime verification tool java PathExplorer
-
K. Havelund and G. Rosu, "An Overview of the Runtime Verification Tool Java PathExplorer", Formal Methods System Design, vol. 24, no. 2, pp. 189-215, 2004.
-
(2004)
Formal Methods System Design
, vol.24
, Issue.2
, pp. 189-215
-
-
Havelund, K.1
Rosu, G.2
-
29
-
-
0031272525
-
Eraser: A dynamic data race detector for multithreaded programs
-
S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson, "Eraser: A Dynamic Data Race Detector for Multithreaded Programs", ACM Trans. Computer Systems, vol. 15, no. 4, pp. 391-411, 1997. (Pubitemid 127449840)
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.4
, pp. 391-411
-
-
Savage, S.1
Burrows, M.2
Nelson, G.3
Sobalvarro, P.4
Anderson, T.5
-
30
-
-
21644474151
-
RacerX: Effective, static detection of race conditions and deadlocks
-
D. Engler and K. Ashcraft, "RacerX: Effective, Static Detection of Race Conditions and Deadlocks", ACM SIGOPS Operating System Rev., vol. 37, no. 5, pp. 237-252, 2003.
-
(2003)
ACM SIGOPS Operating System Rev.
, vol.37
, Issue.5
, pp. 237-252
-
-
Engler, D.1
Ashcraft, K.2
-
31
-
-
0036507891
-
Control-flow checking by software signatures
-
Mar
-
N. Oh, P. P. Shirvani, and E. J. McCluskey, "Control-Flow Checking by Software Signatures", IEEE Trans. Reliability, vol. 51, no. 1, pp. 111-122, Mar. 2002.
-
(2002)
IEEE Trans. Reliability
, vol.51
, Issue.1
, pp. 111-122
-
-
Oh, N.1
Shirvani, P.P.2
McCluskey, E.J.3
-
32
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. L. Erlingsson, and J. Ligatti, "Control-Flow Integrity", Proc. 12th ACM Conf. Computer Comm. Security, 2005.
-
(2005)
Proc. 12th ACM Conf. Computer Comm. Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.L.3
Ligatti, J.4
-
34
-
-
0000990322
-
A survey of program slicing techniques
-
F. Tip, "A Survey of Program Slicing Techniques", J. Programming Languages, vol. 3, no. 3, pp. 121-189, 1995.
-
(1995)
J. Programming Languages
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, F.1
-
37
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck, "Efficiently Computing Static Single Assignment Form and the Control Dependence Graph", ACM Trans. Programming Languages Systems, vol. 13, no. 4, pp. 451-490, 1991.
-
(1991)
ACM Trans. Programming Languages Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
39
-
-
0025568269
-
An overview of common benchmarks
-
Dec
-
R. P. Weicker, "An Overview of Common Benchmarks", Computer, vol. 23, no. 12, pp. 65-75, Dec. 1990.
-
(1990)
Computer
, vol.23
, Issue.12
, pp. 65-75
-
-
Weicker, R.P.1
|