-
1
-
-
84872431733
-
-
Source Edition. ibm.com/software/r ational/products/appscan/source
-
IBM Rational AppScan Source Edition. ibm.com/software/r ational/products/appscan/source.
-
IBM Rational AppScan
-
-
-
3
-
-
26844495240
-
Bounded model construction for monadic second-order logics
-
A. Ayari and D. Basin. Bounded model construction for monadic second-order logics. In CAV, 2000.
-
(2000)
CAV
-
-
Ayari, A.1
Basin, D.2
-
4
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
Oakland
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Security and Privacy (Oakland), 2008.
-
(2008)
Security and Privacy
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
5
-
-
76749161248
-
Path feasibility analysis for string-manipulating programs
-
N. Bjørner, N. Tillmann, and A. Voronkov. Path feasibility analysis for string-manipulating programs. In TACAS, 2009.
-
(2009)
TACAS
-
-
Bjørner, N.1
Tillmann, N.2
Voronkov, A.3
-
6
-
-
35048885595
-
Creating vulnerability signatures using weakest preconditions
-
D. Brumley, H. Wang, S. Jha, and D. Song. Creating vulnerability signatures using weakest preconditions. In CSF, 2007.
-
(2007)
CSF
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
9
-
-
0029180092
-
Formal language, grammar and set-constraint-based program analysis by abstract interpretation
-
P. Cousot and R. Cousot. Formal language, grammar and set-constraint-based program analysis by abstract interpretation. In FPCA, 1995.
-
(1995)
FPCA
-
-
Cousot, P.1
Cousot, R.2
-
10
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. TOPLAS, 1991.
-
(1991)
TOPLAS
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
11
-
-
79952423152
-
A string constraint solver for detecting web application vulnerability
-
X. Fu and C.-C. Li. A string constraint solver for detecting web application vulnerability. In SEKE, 2010.
-
(2010)
SEKE
-
-
Fu, X.1
Li, C.-C.2
-
12
-
-
77949898213
-
Modular string-sensitive permission analysis with demand-driven precision
-
E. Geay, M. Pistoia, T. Tateishi, B. Ryder, and J. Dolby. Modular string-sensitive permission analysis with demand-driven precision. In ICSE, 2009.
-
(2009)
ICSE
-
-
Geay, E.1
Pistoia, M.2
Tateishi, T.3
Ryder, B.4
Dolby, J.5
-
13
-
-
0011792814
-
A Framework for Call Graph Construction Algorithms
-
D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. TOPLSA, 2001.
-
(2001)
TOPLSA
-
-
Grove, D.1
Chambers, C.2
-
16
-
-
0004455556
-
MONA: Monadic second-order logic in practice
-
J. G. Henriksen, J. L. Jensen, M. E. Jørgensen, N. Klarlund, R. Paige, T. Rauhe, and A. Sandholm. MONA: Monadic second-order logic in practice. In TACAS, 1995.
-
(1995)
TACAS
-
-
Henriksen, J.G.1
Jensen, J.L.2
Jørgensen, M.E.3
Klarlund, N.4
Paige, R.5
Rauhe, T.6
Sandholm, A.7
-
17
-
-
70450267483
-
A decision procedure for subset constraints over regular languages
-
P. Hooimeijer and W. Weimer. A decision procedure for subset constraints over regular languages. In PLDI, 2009.
-
(2009)
PLDI
-
-
Hooimeijer, P.1
Weimer, W.2
-
18
-
-
84886511832
-
Regular models of phonological rule systems
-
M. Kay and R. M. Kaplan. Regular models of phonological rule systems. Computational Linguistics, 20(3), 1994.
-
(1994)
Computational Linguistics
, vol.20
, Issue.3
-
-
Kay, M.1
Kaplan, R.M.2
-
19
-
-
85008256304
-
HAMPI: A solver for string constraints
-
A. Kieżun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst. HAMPI: A solver for string constraints. In ISSTA, 2009.
-
(2009)
ISSTA
-
-
Kiezun, A.1
Ganesh, V.2
Guo, P.J.3
Hooimeijer, P.4
Ernst, M.D.5
-
21
-
-
70450245243
-
Merline: Specification inference for explicit information flow problems
-
B. Livshits, A. V. Nori, S. K. Rajamani, and A. Banerjee. Merline: Specification inference for explicit information flow problems. In PLDI, 2009.
-
(2009)
PLDI
-
-
Livshits, B.1
Nori, A.V.2
Rajamani, S.K.3
Banerjee, A.4
-
22
-
-
84923564816
-
Finding security vulnerabilities in java applications with static analysis
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Livshits, V.B.1
Lam, M.S.2
-
23
-
-
33749823368
-
Static approximation of dynamically generated web pages
-
Y. Minamide. Static approximation of dynamically generated web pages. In WWW, 2005.
-
(2005)
WWW
-
-
Minamide, Y.1
-
24
-
-
84987216779
-
Global value numbers and redundant computations
-
B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Global value numbers and redundant computations. In POPL, 1988.
-
(1988)
POPL
-
-
Rosen, B.K.1
Wegman, M.N.2
Zadeck, F.K.3
-
25
-
-
77955220343
-
A symbolic execution framework for javascript
-
Oakland
-
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song. A symbolic execution framework for javascript. In Security and Privacy (Oakland), 2010.
-
(2010)
Security and Privacy
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
26
-
-
84990868632
-
Efficient symbolic execution of strings for validating web applications
-
D. Shannon, I. Ghosh, S. Rajan, and S. Khurshid. Efficient symbolic execution of strings for validating web applications. In DEFECTS, 2009.
-
(2009)
DEFECTS
-
-
Shannon, D.1
Ghosh, I.2
Rajan, S.3
Khurshid, S.4
-
27
-
-
0005301935
-
Combining slicing and constraint solving for validation of measurement software
-
G. Snelting. Combining slicing and constraint solving for validation of measurement software. In SAS, 1996.
-
(1996)
SAS
-
-
Snelting, G.1
-
28
-
-
80051948665
-
Path- and index-sensitive string analysis based on monadic second-order logic
-
T. Tateishi, M. Pistoia, and O. Tripp. Path- and index-sensitive string analysis based on monadic second-order logic. IBM Research Report RT0930, 2011.
-
(2011)
IBM Research Report RT0930
-
-
Tateishi, T.1
Pistoia, M.2
Tripp, O.3
-
29
-
-
70349698143
-
Pex: White box test generation for.NET
-
N. Tillmann and J. D. Halleux. Pex: white box test generation for .NET. In TAP, 2008.
-
(2008)
TAP
-
-
Tillmann, N.1
Halleux, J.D.2
-
30
-
-
70450242742
-
TAJ: Effective taint analysis of web applications
-
O. Tripp, M. Pistoia, S. Fink, M. Sridharan, and O. Weisman. TAJ: Effective taint analysis of web applications. In PLDI, 2009.
-
(2009)
PLDI
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.3
Sridharan, M.4
Weisman, O.5
-
32
-
-
80051918227
-
-
T. J. Watson Libraries for Analysis, wala.sf.net
-
T. J. Watson Libraries for Analysis, wala.sf.net/.
-
-
-
-
33
-
-
35449004893
-
Sound and precise analysis of web applications for injection vulnerabilities
-
G. Wassermann and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. In PLDI, 2007.
-
(2007)
PLDI
-
-
Wassermann, G.1
Su, Z.2
-
34
-
-
84976709672
-
Constant propagation with conditional branches
-
M. N. Wegman and F. K. Zadeck. Constant propagation with conditional branches. TOPLAS, 1991.
-
(1991)
TOPLAS
-
-
Wegman, M.N.1
Zadeck, F.K.2
-
35
-
-
77952112519
-
Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
-
F. Yu, M. Alkhalaf, and T. Bultan. Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses. In ASE, 2009.
-
(2009)
ASE
-
-
Yu, F.1
Alkhalaf, M.2
Bultan, T.3
-
37
-
-
80051920443
-
-
Z3, research.microsoft.com/projects/z3
-
Z3, research.microsoft.com/projects/z3.
-
-
-
|