-
1
-
-
69149105622
-
Adding nesting structure to words
-
May Article 16
-
R. Alur and P. Madhusudan. Adding nesting structure to words. Journal of the ACM, 56(3), May 2009. Article 16.
-
(2009)
Journal of the ACM
, vol.56
, Issue.3
-
-
Alur, R.1
Madhusudan, P.2
-
2
-
-
35048896043
-
Analyzing memory accesses in x86 executables
-
Proc. of the Int. Conf. on Compiler Construction, Springer
-
G. Balakrishnan and T. Reps. Analyzing memory accesses in x86 executables. In Proc. of the Int. Conf. on Compiler Construction, LNCS, pages 5-23. Springer, 2004.
-
(2004)
LNCS
, pp. 5-23
-
-
Balakrishnan, G.1
Reps, T.2
-
3
-
-
77955623537
-
WYSINWYX:What you see is not what you eXecute
-
August Article 23
-
G. Balakrishnan and T. Reps. WYSINWYX:What you see is not what you eXecute. ACM Trans. Program. Lang. Syst., 32(6), August 2010. Article 23.
-
(2010)
ACM Trans. Program. Lang. Syst.
, vol.32
, Issue.6
-
-
Balakrishnan, G.1
Reps, T.2
-
4
-
-
33749859895
-
Recency-abstraction for heap-allocated storage
-
Proc. of the Int. Symp. on Static Analysis, Springer
-
G. Balakrishnan and T. W. Reps. Recency-abstraction for heap-allocated storage. In Proc. of the Int. Symp. on Static Analysis, volume 4134 of LNCS, pages 221-239. Springer, 2006.
-
(2006)
LNCS
, vol.4134
, pp. 221-239
-
-
Balakrishnan, G.1
Reps, T.W.2
-
5
-
-
0034818448
-
Automatic predicate abstraction of C programs
-
ACM Press
-
T. Ball, R. Majumdar, T. Millstein, and S. K. Rajamani. Automatic predicate abstraction of C programs. In Proc. of the Conf. on Programming Language Design and Implementation, pages 203-213. ACM Press, 2001.
-
(2001)
Proc. of the Conf. on Programming Language Design and Implementation
, pp. 203-213
-
-
Ball, T.1
Majumdar, R.2
Millstein, T.3
Rajamani, S.K.4
-
6
-
-
0020876533
-
Automatic generation of random self-checking test cases
-
D. L. Bird and C. U. Munoz. Automatic generation of random self-checking test cases. IBM System Journal, 22:229-245, 1983.
-
(1983)
IBM System Journal
, vol.22
, pp. 229-245
-
-
Bird, D.L.1
Munoz, C.U.2
-
7
-
-
84882738195
-
Automatically identifying trigger-based behavior in malware
-
of Advances in Information Security, Springer
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Automatically identifying trigger-based behavior in malware. In Botnet Detection, volume 36 of Advances in Information Security, pages 65-88. Springer, 2008.
-
(2008)
Botnet Detection
, vol.36
, pp. 65-88
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
9
-
-
85076893888
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
USENIX Association
-
C. Cadar, D. Dunbar, and D. Engler. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In Proc. of the Conf. on Operating Systems Design and Implementation, pages 209-224. USENIX Association, 2008.
-
(2008)
Proc. of the Conf. on Operating Systems Design and Implementation
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
10
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
ACM
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: automatically generating inputs of death. In Proc. of the Conf. on Computer and Communications Security, pages 322-335. ACM, 2006.
-
(2006)
Proc. of the Conf. on Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
12
-
-
0003962322
-
-
MIT Press, Cambridge, MA, USA
-
E. M. Clarke, O. Grumberg, and D. A. Peled. Model checking. MIT Press, Cambridge, MA, USA, 1999.
-
(1999)
Model Checking
-
-
Clarke, E.M.1
Grumberg, O.2
Peled, D.A.3
-
13
-
-
85059770931
-
The complexity of theorem-proving procedures
-
ACM Press
-
S. A. Cook. The complexity of theorem-proving procedures. In Proc. of the Symp. on Theory of Computing, pages 151-158. ACM Press, 1971.
-
(1971)
Proc. of the Symp. on Theory of Computing
, pp. 151-158
-
-
Cook, S.A.1
-
14
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
ACM
-
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. of the Symp. on Principles of Programming Languages, pages 238-252. ACM, 1977.
-
(1977)
Proc. of the Symp. on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
16
-
-
45749085681
-
Z3: An efficient SMT solver
-
Proc. of the Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems, Springer
-
L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In Proc. of the Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems, volume 4963 of LNCS, pages 337-340. Springer, 2008.
-
(2008)
LNCS
, vol.4963
, pp. 337-340
-
-
De Moura, L.1
Bjørner, N.2
-
17
-
-
34147120474
-
A note on two problems in connexion with graphs
-
E. W. Dijkstra. A note on two problems in connexion with graphs. Numerische Mathematik, 1:269-271, 1959.
-
(1959)
Numerische Mathematik
, vol.1
, pp. 269-271
-
-
Dijkstra, E.W.1
-
18
-
-
10444262814
-
Directed explicit-state model checking in the validation of communication protocols
-
S. Edelkamp, S. Leue, and A. Lluch-Lafuente. Directed explicit-state model checking in the validation of communication protocols. Int. J. Softw. Tools Technol. Transf., 5(2):247-267, 2004.
-
(2004)
Int. J. Softw. Tools Technol. Transf.
, vol.5
, Issue.2
, pp. 247-267
-
-
Edelkamp, S.1
Leue, S.2
Lluch-Lafuente, A.3
-
20
-
-
84896693691
-
Exploring very large state spaces using genetic algorithms
-
P. Godefroid and S. Khurshid. Exploring very large state spaces using genetic algorithms. Int. J. Softw. Tools Technol. Transf., 6(2):117-127, 2004.
-
(2004)
Int. J. Softw. Tools Technol. Transf.
, vol.6
, Issue.2
, pp. 117-127
-
-
Godefroid, P.1
Khurshid, S.2
-
23
-
-
34547150779
-
SYNERGY: A new algorithm for property checking
-
ACM
-
B. S. Gulavani, T. A. Henzinger, Y. Kannan, A. V. Nori, and S. K. Rajamani. SYNERGY: a new algorithm for property checking. In Proc. of the Int. Symp. on Foundations of Software Engineering, pages 117-127. ACM, 2006.
-
(2006)
Proc. of the Int. Symp. on Foundations of Software Engineering
, pp. 117-127
-
-
Gulavani, B.S.1
Henzinger, T.A.2
Kannan, Y.3
Nori, A.V.4
Rajamani, S.K.5
-
26
-
-
79960243871
-
-
ISO. Technical report, ISO
-
ISO. ISO C standard 1999. Technical report, ISO, 1999.
-
(1999)
ISO C Standard 1999
-
-
-
27
-
-
58449105414
-
An abstract interpretation-based framework for control flow reconstruction from binaries
-
Proc. of the Int. Conf. on Verification, Model Checking, and Abstract Interpretation, Springer
-
J. Kinder, F. Zuleger, and H. Veith. An abstract interpretation-based framework for control flow reconstruction from binaries. In Proc. of the Int. Conf. on Verification, Model Checking, and Abstract Interpretation, volume 5403 of LNCS, pages 214-228. Springer, 2009.
-
(2009)
LNCS
, vol.5403
, pp. 214-228
-
-
Kinder, J.1
Zuleger, F.2
Veith, H.3
-
28
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
29
-
-
33745768860
-
Path optimization in programs and its application to debugging
-
Springer
-
A. Lal, J. Lim, M. Polishchuk, and B. Liblit. Path optimization in programs and its application to debugging. In Proc. of the Eur. Symp. on Programming Languages and Systems, pages 246-263. Springer, 2006.
-
(2006)
Proc. of the Eur. Symp. on Programming Languages and Systems
, pp. 246-263
-
-
Lal, A.1
Lim, J.2
Polishchuk, M.3
Liblit, B.4
-
31
-
-
31944440969
-
PIN: Building customized program analysis tools with dynamic instrumentation
-
ACM
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. PIN: Building customized program analysis tools with dynamic instrumentation. In Proc. of the Conf. on Programming Language Design and Implementation, pages 190-200. ACM, 2005.
-
(2005)
Proc. of the Conf. on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
32
-
-
0032680865
-
GRASP: A search algorithm for propositional satisfiability
-
J. P. Marques-Silva and K. A. Sakallah. GRASP: A search algorithm for propositional satisfiability. IEEE Transactions on Computers, 48(5):506-521, 1999.
-
(1999)
IEEE Transactions on Computers
, vol.48
, Issue.5
, pp. 506-521
-
-
Marques-Silva, J.P.1
Sakallah, K.A.2
-
35
-
-
0347115912
-
Red-black trees in a functional setting
-
July
-
C. Okasaki. Red-black trees in a functional setting. Journal of Functional Programming, 9(4):471-477, July 1999.
-
(1999)
Journal of Functional Programming
, vol.9
, Issue.4
, pp. 471-477
-
-
Okasaki, C.1
-
39
-
-
24344477041
-
Weighted pushdown systems and their application to interprocedural dataflow analysis
-
DOI 10.1016/j.scico.2005.02.009, PII S0167642305000493, Static Analysis Symposium 2003
-
T. Reps, S. Schwoon, S. Jha, and D. Melski. Weighted pushdown systems and their application to interprocedural dataflow analysis. Sci. Comput. Program., 58:206-263, 2005. (Pubitemid 41261382)
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 206-263
-
-
Reps, T.1
Schwoon, S.2
Jha, S.3
Melski, D.4
-
41
-
-
85008263148
-
Loop-extended symbolic execution on binary programs
-
ACM
-
P. Saxena, P. Poosankam, S. McCamant, and D. Song. Loop-extended symbolic execution on binary programs. In Proc. of the Int. Symp. on Software Testing and Analysis, pages 225-236. ACM, 2009.
-
(2009)
Proc. of the Int. Symp. on Software Testing and Analysis
, pp. 225-236
-
-
Saxena, P.1
Poosankam, P.2
McCamant, S.3
Song, D.4
-
43
-
-
0002823436
-
Two approaches to interprocedural data flow analysis
-
chapter 7, Prentice-Hall
-
M. Sharir and A. Pnueli. Two approaches to interprocedural data flow analysis. In Program Flow Analysis: Theory and Applications, chapter 7, pages 189-234. Prentice-Hall, 1981.
-
(1981)
Program Flow Analysis: Theory and Applications
, pp. 189-234
-
-
Sharir, M.1
Pnueli, A.2
-
44
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
Proc. of the Int. Conf. on Information Systems Security, Springer
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis. In Proc. of the Int. Conf. on Information Systems Security, volume 5352 of LNCS, pages 1-25. Springer, 2008.
-
(2008)
LNCS
, vol.5352
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
45
-
-
0004096330
-
-
Technical report, CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands
-
F. Tip. A survey of program slicing techniques. Technical report, CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands, 1994.
-
(1994)
A Survey of Program Slicing Techniques
-
-
Tip, F.1
|