-
1
-
-
0004072686
-
-
Addison-Wesley, Reading
-
Aho, A., Sethi, R., Ullman, J.: Compilers: Principles, Techniques and Tools. Addison-Wesley, Reading (1986)
-
(1986)
Compilers: Principles, Techniques and Tools
-
-
Aho, A.1
Sethi, R.2
Ullman, J.3
-
2
-
-
47249150568
-
Demand-driven compositional symbolic execution
-
Ramakrishnan, C.R., Rehof, J. (eds.) LNCS Springer, Heidelberg
-
Anand, S., Godefroid, P., Tillmann, N.: Demand-Driven Compositional Symbolic Execution. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 367-381. Springer, Heidelberg (2008)
-
(2008)
TACAS 2008
, vol.4963
, pp. 367-381
-
-
Anand, S.1
Godefroid, P.2
Tillmann, N.3
-
3
-
-
33749664425
-
Boogie: A modular reusable verifier for object-oriented programs
-
Formal Methods for Components and Objects - 4th International Symposium, FMCO 2005, Revised Lectures
-
Barnett, M., Chang, B.E., DeLine, R., Jacobs, B., Leino, K.R.M.: Boogie: A modular reusable verifier for object-oriented programs. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P (eds.) FMCO 2005. LNCS, vol. 4111, pp. 364-387. Springer, Heidelberg (2005) (Pubitemid 44548955)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4111
, pp. 364-387
-
-
Barnett, M.1
Chang, B.-Y.E.2
DeLine, R.3
Jacobs, B.4
Leino, K.R.M.5
-
4
-
-
84885205652
-
Weakest-precondition of unstructured programs
-
Barnett, M., Leino, K.R.M.: Weakest-precondition of unstructured programs. In: PASTE 2005, pp. 82-87 (2005)
-
(2005)
PASTE 2005
, pp. 82-87
-
-
Barnett, M.1
Leino, K.R.M.2
-
5
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
Cadar, C, Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: EXE: Automatically Generating Inputs of Death. In: ACM CCS (2006)
-
(2006)
ACM CCS
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
6
-
-
70450240790
-
Snugglebug: A powerful approach to weakest preconditions
-
Chandra, S., Fink, S.J., Sridharan, M.: Snugglebug: A Powerful Approach to Weakest Preconditions. In: PLDI 2009 (2009)
-
(2009)
PLDI 2009
-
-
Chandra, S.1
Fink, S.J.2
Sridharan, M.3
-
7
-
-
26444620059
-
Incremental algorithms for inter-procedural analysis of safety properties
-
Computer Aided Verification: 17th International Conference, CAV 2005. Proceedings
-
Conway, C.L., Namjoshi, K.S., Dams, D., Edwards, S.A.: Incremental algorithms for inter-procedural analysis of safety properties. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 449-461. Springer, Heidelberg (2005) (Pubitemid 41431756)
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 449-461
-
-
Conway, C.L.1
Namjoshi, K.S.2
Dams, D.3
Edwards, S.A.4
-
8
-
-
45749085681
-
Z3: An efficient SMT solver
-
Ramakrishnan, C.R., Rehof, J. (eds.) LNCS Springer, Heidelberg
-
de Moura, L., Bjorner, N.: Z3: An Efficient SMT Solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337-340. Springer, Heidelberg (2008)
-
(2008)
TACAS 2008
, vol.4963
, pp. 337-340
-
-
De Moura, L.1
Bjorner, N.2
-
9
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM 18, 453-457 (1975)
-
(1975)
Communications of the ACM
, vol.18
, pp. 453-457
-
-
Dijkstra, E.W.1
-
10
-
-
0004349103
-
Vulcan: Binary transformation in a distributed environment
-
Microsoft Research
-
Edwards, A., Srivastava, A., Vo, H.: Vulcan: Binary transformation in a distributed environment. Technical report, MSR-TR-2001-50, Microsoft Research (2001)
-
(2001)
Technical Report, MSR-TR-2001-50
-
-
Edwards, A.1
Srivastava, A.2
Vo, H.3
-
11
-
-
34548273557
-
Compositional dynamic test generation
-
Godefroid, P.: Compositional Dynamic Test Generation. In: POPL 2007, pp. 47-54 (2007)
-
(2007)
POPL 2007
, pp. 47-54
-
-
Godefroid, P.1
-
12
-
-
77955879383
-
Software model checking improving security of a billion computers
-
Pasareanu, C.S. (ed.) LNCS Springer, Heidelberg
-
Godefroid, P.: Software Model Checking Improving Security of a Billion Computers. In: Pasareanu, C.S. (ed.) Model Checking Software. LNCS, vol. 5578, pp. 1-1. Springer, Heidelberg (2009)
-
(2009)
Model Checking Software
, vol.5578
, pp. 1-1
-
-
Godefroid, P.1
-
13
-
-
84944065857
-
Abstraction-based model checking using modal transition systems
-
CONCUR 2001 - Concurrency Theory
-
Godefroid, P., Huth, M., Jagadeesan, R.: Abstraction-Based Model Checking Using Modal Transition Systems. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol. 2154, pp. 426-440. Springer, Heidelberg (2001) (Pubitemid 33326672)
-
(2001)
Lecture Notes in Computer Science
, Issue.2154
, pp. 426-440
-
-
Godefroid, P.1
Huth, M.2
Jagadeesan, R.3
-
14
-
-
31844450371
-
DART: Directed automated random testing
-
Godefroid, P., Klarlund, N., Sen, K.: DART: Directed Automated Random Testing. In: PLDI 2005, pp. 213-223 (2005)
-
(2005)
PLDI 2005
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
15
-
-
85128730845
-
Automated whitebox fuzz testing
-
Godefroid, P., Levin, M., Molnar, D.: Automated Whitebox Fuzz Testing. In: NDSS 2008, pp. 151-166 (2008)
-
(2008)
NDSS 2008
, pp. 151-166
-
-
Godefroid, P.1
Levin, M.2
Molnar, D.3
-
16
-
-
77950894390
-
Compositional must program analysis: Unleashing the power of alternation
-
Godefroid, P., Nori, A., Rajamani, S., Tetali, S.: Compositional Must Program Analysis: Unleashing The Power of Alternation. In: POPL 2010 (2010)
-
(2010)
POPL 2010
-
-
Godefroid, P.1
Nori, A.2
Rajamani, S.3
Tetali, S.4
-
17
-
-
0011783904
-
An empirical study of regression test selection techniques
-
DOI 10.1145/367008.367020
-
Graves, T.L., Harrold, M.J., Kim, J.-M., Porter, A., Rothermel, G.: An Empirical Study of Regression Test Selection Techniques. ACM Transactions on Software Engineering and Methodology (TOSEM) 10(2), 184-208 (2001) (Pubitemid 33602334)
-
(2001)
ACM Transactions on Software Engineering and Methodology
, vol.10
, Issue.2
, pp. 184-208
-
-
Graves, T.L.1
Harrold, M.J.2
Kim, J.-M.3
Porter, A.4
Rothermel, G.5
-
18
-
-
33749840437
-
YASM: A software model-checker for verification and refutation
-
Computer Aided Verification - 18th International Conference, CAV 2006, Proceedings
-
Gurfinkel, A., Wei, O., Chechik, M.: YASM: A Software Model-Checker for Verification and Refutation. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 170-174. Springer, Heidelberg (2006) (Pubitemid 44560875)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4144
, pp. 170-174
-
-
Gurfinkel, A.1
Wei, O.2
Chechik, M.3
-
19
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
Hallem, S., Chelf, B., Xie, Y., Engler, D.: A System and Language for Building System-Specific Static Analyses. In: PLDI 2002, pp. 69-82 (2002) (Pubitemid 34991508)
-
(2002)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
, pp. 69-82
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
20
-
-
70649095126
-
It's doomed; we can prove it
-
Cavalcanti, A., Dams, D.R. (eds.) LNCS Springer, Heidelberg
-
Hoenicke, J., Leino, K.R.M., Podelski, A., Schaf, M., Wies, T.: It's doomed; we can prove it. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 338-353. Springer, Heidelberg (2009)
-
(2009)
FM 2009
, vol.5850
, pp. 338-353
-
-
Hoenicke, J.1
Leino, K.R.M.2
Podelski, A.3
Schaf, M.4
Wies, T.5
-
22
-
-
77950482688
-
Differential symbolic execution
-
Person, S., Dwyer, M.B., Elbaum, S.G., Pasareanu, C.S.: Differential symbolic execution. In: SIGSOFT FSE, pp. 226-237 (2008)
-
(2008)
SIGSOFT FSE
, pp. 226-237
-
-
Person, S.1
Dwyer, M.B.2
Elbaum, S.G.3
Pasareanu, C.S.4
-
23
-
-
79959884205
-
Directed incremental symbolic execution
-
Person, S., Yang, G., Rungta, N., Khurshid, S.: Directed Incremental Symbolic Execution. In: PLDI 2011, pp. 504-515 (2011)
-
(2011)
PLDI 2011
, pp. 504-515
-
-
Person, S.1
Yang, G.2
Rungta, N.3
Khurshid, S.4
-
24
-
-
0005329070
-
A categorized bibliography on incremental algorithms
-
Ramalingam, G., Reps, T.: A Categorized Bibliography on Incremental Algorithms. In: POPL 1993, pp. 502-510 (1993)
-
(1993)
POPL 1993
, pp. 502-510
-
-
Ramalingam, G.1
Reps, T.2
-
25
-
-
0029180939
-
Precise interprocedural dataflow analysis via graph reachability
-
Reps, T., Horwitz, S., Sagiv, M.: Precise Interprocedural Dataflow Analysis via Graph Reachability. In: POPL 1995, pp. 49-61 (1995)
-
(1995)
POPL 1995
, pp. 49-61
-
-
Reps, T.1
Horwitz, S.2
Sagiv, M.3
-
26
-
-
77954471158
-
Precisely detecting runtime change interactions for evolving software
-
Santelices, R.A., Harrold, M.J., Orso, A.: Precisely detecting runtime change interactions for evolving software. In: ICST, pp. 429-438 (2010)
-
(2010)
ICST
, pp. 429-438
-
-
Santelices, R.A.1
Harrold, M.J.2
Orso, A.3
|