-
3
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In IEEE Working Conference on Reverse Engineering, pages 86-95, 1995.
-
(1995)
IEEE Working Conference on Reverse Engineering
, pp. 86-95
-
-
Baker, B.S.1
-
5
-
-
34748831643
-
Thorough static analysis of device drivers
-
T. Ball, E. Bounimova, B. Cook, V. Levin, J. Lichtenberg, C. McGarvey, B. Ondrusek, S. K. Rajamani, and A. Ustuner. Thorough static analysis of device drivers. In ACM European Conference on Computer Systems, pages 73-85, 2006.
-
(2006)
ACM European Conference on Computer Systems
, pp. 73-85
-
-
Ball, T.1
Bounimova, E.2
Cook, B.3
Levin, V.4
Lichtenberg, J.5
McGarvey, C.6
Ondrusek, B.7
Rajamani, S.K.8
Ustuner, A.9
-
6
-
-
35348951470
-
The software model checker BLAST
-
D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. The software model checker BLAST. International Journal on Software Tools for Technology Transfer, 9(5-6):505-525, 2007.
-
(2007)
International Journal on Software Tools for Technology Transfer
, vol.9
, Issue.5-6
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
8
-
-
0022706656
-
Automatic verification of finite-state concurrent systems using temporal logic specifications
-
E. M. Clarke, E. A. Emerson, and A. P. Sistla. Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Transactions on Programming Languages and Systems, 8(2):244-263, 1986.
-
(1986)
ACM Transactions on Programming Languages and Systems
, vol.8
, Issue.2
, pp. 244-263
-
-
Clarke, E.M.1
Emerson, E.A.2
Sistla, A.P.3
-
9
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Exposition, pages 119-129, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, pp. 119-129
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
11
-
-
0002940467
-
Using types to analyze and optimize object-oriented programs
-
A. Diwan, K. S. McKinley, and J. E. B. Moss. Using types to analyze and optimize object-oriented programs. ACM Transactions on Programming Languages and Systems, 23(1):30-72, 2001.
-
(2001)
ACM Transactions on Programming Languages and Systems
, vol.23
, Issue.1
, pp. 30-72
-
-
Diwan, A.1
McKinley, K.S.2
Moss, J.E.B.3
-
14
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In ACM Symposium on Operating Systems Principles, pages 57-72, 2001.
-
(2001)
ACM Symposium on Operating Systems Principles
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
15
-
-
34548734722
-
Mining security-sensitive operations in legacy code using concept analysis
-
V. Ganapathy, D. King, T. Jaeger, and S. Jha. Mining security-sensitive operations in legacy code using concept analysis. In ACM International Conference on Software Engineering, pages 458-467, 2007.
-
(2007)
ACM International Conference on Software Engineering
, pp. 458-467
-
-
Ganapathy, V.1
King, D.2
Jaeger, T.3
Jha, S.4
-
16
-
-
84874114744
-
-
Google. Google Apps. http://www.google.com/apps/.
-
Google Apps
-
-
-
18
-
-
24344495245
-
Error checking with client-driven pointer analysis
-
DOI 10.1016/j.scico.2005.02.005, PII S0167642305000456, Static Analysis Symposium 2003
-
S. Z. Guyer and C. Lin. Error checking with client-driven pointer analysis. Science of Computer Programming, 58(1-2):83-114, 2005. (Pubitemid 41261378)
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 83-114
-
-
Guyer, S.Z.1
Lin, C.2
-
20
-
-
77956385334
-
-
IBM. Cloud Computing. http://ibm.com/developerworks/cloud/.
-
Cloud Computing
-
-
-
22
-
-
0038108908
-
Access rights analysis for Java
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access rights analysis for Java. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 359-372, 2002.
-
(2002)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
23
-
-
0034770139
-
Identifying similar code with program dependence graphs
-
J. Krinke. Identifying similar code with program dependence graphs. In IEEEWorking Conference on Reverse Engineering, pages 301-309, 2001.
-
(2001)
IEEEWorking Conference on Reverse Engineering
, pp. 301-309
-
-
Krinke, J.1
-
26
-
-
34547229642
-
Have things changed now? An empirical study of bug characteristics in modern open source software
-
Z. Li, L. Tan, X. Wang, S. Lu, Y. Zhou, and C. Zhai. Have things changed now? An empirical study of bug characteristics in modern open source software. In Workshop on Architectural and System Support for Improving Software Dependability (ASID), pages 25-33, 2006.
-
(2006)
Workshop on Architectural and System Support for Improving Software Dependability (ASID)
, pp. 25-33
-
-
Li, Z.1
Tan, L.2
Wang, X.3
Lu, S.4
Zhou, Y.5
Zhai, C.6
-
27
-
-
0025548384
-
Properties of data flow frameworks
-
T. J. Marlowe and B. G. Ryder. Properties of data flow frameworks. Acta Informatics (ACTA), 28(2):121-163, 1990.
-
(1990)
Acta Informatics (ACTA)
, vol.28
, Issue.2
, pp. 121-163
-
-
Marlowe, T.J.1
Ryder, B.G.2
-
28
-
-
26444502057
-
Interprocedural analysis for privileged code placement and tainted variable detection
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural analysis for privileged code placement and tainted variable detection. In European Conference on Object-Oriented Programming, pages 362-386, 2005.
-
(2005)
European Conference on Object-Oriented Programming
, pp. 362-386
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
29
-
-
79959868489
-
-
Salesforce. Salesforce Platform. http://www.salesforce.com/platform/.
-
Salesforce Platform
-
-
-
30
-
-
77952358659
-
CMV: Automatic verification of complete mediation for Java Virtual Machines
-
A. P. Sistla, V. N. Venkatakrishnan, M. Zhou, and H. Branske. CMV: Automatic verification of complete mediation for Java Virtual Machines. In ACM Symposium on Information, Computer and Communications Security, pages 100-111, 2008.
-
(2008)
ACM Symposium on Information, Computer and Communications Security
, pp. 100-111
-
-
Sistla, A.P.1
Venkatakrishnan, V.N.2
Zhou, M.3
Branske, H.4
-
33
-
-
85183720125
-
-
submitted to Sun JDK, Jan-Oct
-
V. Srivastava. Vulnerabilities submitted to Sun JDK, Jan-Oct 2010. http://bugs.sun.com/bugdatabase/view-bug.do?bug-id=6914460.
-
(2010)
Vulnerabilities
-
-
Srivastava, V.1
-
34
-
-
17944366401
-
Practical virtual method call resolution for Java
-
V. Sundaresan, L. Hendren, C. Razafimahefa, R. Vallée-Rai, P. Lam, E. Gagnon, and C. Godin. Practical virtual method call resolution for Java. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 264-280, 2000.
-
(2000)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 264-280
-
-
Sundaresan, V.1
Hendren, L.2
Razafimahefa, C.3
Vallée-Rai, R.4
Lam, P.5
Gagnon, E.6
Godin, C.7
-
35
-
-
84894034704
-
AutoISES: Automatically inferring security specifications and detecting violations
-
L. Tan, X. Zhang, X. Ma, W. Xiong, and Y. Zhou. AutoISES: Automatically inferring security specifications and detecting violations. In USENIX Security Symposium, pages 379-394, 2008.
-
(2008)
USENIX Security Symposium
, pp. 379-394
-
-
Tan, L.1
Zhang, X.2
Ma, X.3
Xiong, W.4
Zhou, Y.5
-
39
-
-
73649126934
-
Native Client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A sandbox for portable, untrusted x86 native code. Communications of the ACM, 53(1):91-99, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.1
, pp. 91-99
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|