-
1
-
-
78751491172
-
-
Personal communication with Code Reviewer at Microsoft
-
Personal communication with Mingdong Shang, Code Reviewer at Microsoft, 2006.
-
(2006)
-
-
Shang, M.1
-
4
-
-
79952020076
-
RICH: Automatically protecting against integer-based vulnerabilities
-
D. Brumley, T. Chiueh, R. Johnson, H. Lin, and D. Song. RICH: Automatically protecting against integer-based vulnerabilities. In Symposium on Network and Distributed Systems Security, 2007.
-
Symposium on Network and Distributed Systems Security, 2007
-
-
Brumley, D.1
Chiueh, T.2
Johnson, R.3
Lin, H.4
Song, D.5
-
8
-
-
78751471625
-
-
CVE. http://cve.mitre.org/.
-
-
-
-
12
-
-
78751520973
-
-
FindBugs. http://findbugs.sourceforge.net/.
-
-
-
-
14
-
-
0027845997
-
Dynamic impact analysis: A cost-effective technique to enforce error-propagation
-
T. Goradia. Dynamic impact analysis: a cost-effective technique to enforce error-propagation. SIGSOFT Software Engineering Notes, 1993.
-
(1993)
SIGSOFT Software Engineering Notes
-
-
Goradia, T.1
-
17
-
-
47149098381
-
Testing the value of checklists in code inspections
-
L. Hatton. Testing the value of checklists in code inspections. IEEE Software, 2008.
-
(2008)
IEEE Software
-
-
Hatton, L.1
-
24
-
-
36549014520
-
Bugbench: Benchmarks for evaluating bug detection tools
-
S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou. Bugbench: Benchmarks for evaluating bug detection tools. In Proceedings of Workshop on the Evaluation of Software Defect Detection Tools, 2005.
-
Proceedings of Workshop on the Evaluation of Software Defect Detection Tools, 2005
-
-
Lu, S.1
Li, Z.2
Qin, F.3
Tan, L.4
Zhou, P.5
Zhou, Y.6
-
26
-
-
78751518396
-
-
Phoenix. http://research.microsoft.com/phoenix/.
-
Phoenix
-
-
-
27
-
-
57349111758
-
Predicting accurate and actionable static analysis warnings: An experimental approach
-
J. R. Ruthruff, J. Penix, J. D. Morgenthaler, S. Elbaum, and G. Rothermel. Predicting accurate and actionable static analysis warnings: an experimental approach. In Proceedings of the 30th international conference on Software engineering, 2008.
-
Proceedings of the 30th International Conference on Software Engineering, 2008
-
-
Ruthruff, J.R.1
Penix, J.2
Morgenthaler, J.D.3
Elbaum, S.4
Rothermel, G.5
-
28
-
-
33846287594
-
Model checking an entire linux distribution for security violations
-
B. Schwarz, H. Chen, D. Wagner, J. Lin, W. Tu, G. Morrison, and J. West. Model checking an entire linux distribution for security violations. In Proceedings of the 21st Annual Computer Security Applications Conference, 2005.
-
Proceedings of the 21st Annual Computer Security Applications Conference, 2005
-
-
Schwarz, B.1
Chen, H.2
Wagner, D.3
Lin, J.4
Tu, W.5
Morrison, G.6
West, J.7
-
31
-
-
0000040013
-
Yesterday, my program worked. today, it does not. why?
-
A. Zeller. Yesterday, my program worked. today, it does not. why? SIGSOFT Software Engineering Notes, 1999.
-
(1999)
SIGSOFT Software Engineering Notes
-
-
Zeller, A.1
-
32
-
-
77949365707
-
Capturing propagation of infected program states
-
Z. Zhang, W. K. Chan, T. H. Tse, B. Jiang, and X. Wang. Capturing propagation of infected program states. In Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium, 2009.
-
(2009)
Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium
-
-
Zhang, Z.1
Chan, W.K.2
Tse, T.H.3
Jiang, B.4
Wang, X.5
|