-
1
-
-
0029181418
-
An extended form of must alias analysis for dynamic allocation
-
New York, NY, USA, ACM Press
-
R. Z. Altucher and W. Landi. An extended form of must alias analysis for dynamic allocation. In POPL '95: Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 74-84, New York, NY, USA, 1995. ACM Press.
-
(1995)
POPL '95: Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 74-84
-
-
Altucher, R.Z.1
Landi, W.2
-
3
-
-
1542595072
-
Extending Java for high-level Web service construction
-
DOI 10.1145/945885.945890
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach. Extending Java for high-level Web service construction. ACM Transactions on Programming Languages and Systems, 25(6):814-875, Nov. 2003. (Pubitemid 41283893)
-
(2003)
ACM Transactions on Programming Languages and Systems
, vol.25
, Issue.6
, pp. 814-875
-
-
Christensen, A.S.1
Moller, A.2
Schwartzbach, M.I.3
-
4
-
-
35248891044
-
Precise analysis of string expressions
-
Proceedings of the 10th International Static Analysis Symposium (SAS '03), Springer-Verlag, June
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proceedings of the 10th International Static Analysis Symposium (SAS '03), volume 2694 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, June 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2694
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
7
-
-
84862930937
-
-
Published online at Last accessed on 3 Feb. 2003
-
DataRescue sa/nv. IDA Pro - interactive disassembler. Published online at http://www.datarescue.com/idabase/. Last accessed on 3 Feb. 2003.
-
IDA Pro - Interactive Disassembler
-
-
-
9
-
-
1442337851
-
CSSV: Towards a realistic tool for statically detecting all buffer overflows in C
-
San Diego, CA, USA, June ACM Press
-
N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a realistic tool for statically detecting all buffer overflows in C. In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (SIGPLAN'03), pages 155-167, San Diego, CA, USA, June 2003. ACM Press.
-
(2003)
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (SIGPLAN'03)
, pp. 155-167
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
10
-
-
3142582577
-
Buffer overrun detection using linear programming and static analysis
-
Washington D.C., USA, Oct. ACM Press
-
V. Ganapathy, S. Jha, D. Chandler, D. Melski, and D. Vitek. Buffer overrun detection using linear programming and static analysis. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), pages 345-354, Washington D.C., USA, Oct. 2003. ACM Press.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 345-354
-
-
Ganapathy, V.1
Jha, S.2
Chandler, D.3
Melski, D.4
Vitek, D.5
-
12
-
-
4544280668
-
Static checking of dynamically generated queries in database applications
-
Edinburgh, Scotland, UK, May IEEE Computer Society
-
C. Gould, Z. Su, and P. Devanbu. Static checking of dynamically generated queries in database applications. In Proceedings of the 26th International Conference on Software Engineering (ICSE '04), pages 645-654, Edinburgh, Scotland, UK, May 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 26th International Conference on Software Engineering (ICSE '04)
, pp. 645-654
-
-
Gould, C.1
Su, Z.2
Devanbu, P.3
-
13
-
-
1942468145
-
Static analysis of XML transformations in Java
-
Mar.
-
C. Kirkegaard, A. Møller, and M. I. Schwartzbach. Static analysis of XML transformations in Java. IEEE Transactions on Software Engineering, 30(3):181-192, Mar. 2004.
-
(2004)
IEEE Transactions on Software Engineering
, vol.30
, Issue.3
, pp. 181-192
-
-
Kirkegaard, C.1
Møller, A.2
Schwartzbach, M.I.3
-
14
-
-
14344257909
-
Abstract stack graph to detect obfuscated calls in binaries
-
Chicago, IL, USA, Sept. IEEE Computer Society
-
A. Lakhotia and E. U. Kumar. Abstract stack graph to detect obfuscated calls in binaries. In Proceedings of the Fourth IEEE International Workshop on Source Code Analysis and Manipulation, pages 17-26, Chicago, IL, USA, Sept. 2004. IEEE Computer Society.
-
(2004)
Proceedings of the Fourth IEEE International Workshop on Source Code Analysis and Manipulation
, pp. 17-26
-
-
Lakhotia, A.1
Kumar, E.U.2
-
16
-
-
0012267739
-
Regular approximation of context-free grammars through transformation
-
J.-C. Junqua and G. van Noord, editors, Kluwer Academic Publishers
-
M. Mohri and M.-J. Nederhof. Regular approximation of context-free grammars through transformation. In J.-C. Junqua and G. van Noord, editors, Robustness in Language and Speech Technology, pages 153-163. Kluwer Academic Publishers, 2001.
-
(2001)
Robustness in Language and Speech Technology
, pp. 153-163
-
-
Mohri, M.1
Nederhof, M.-J.2
-
17
-
-
84957893289
-
Type-based decompilation
-
Proceedings of the European Symposium on Programming, Springer-Verlag
-
A. Mycroft. Type-based decompilation. In Proceedings of the European Symposium on Programming, volume 1576 of Lecture Notes in Computer Science, pages 208-223. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1576
, pp. 208-223
-
-
Mycroft, A.1
-
18
-
-
24344477041
-
Weighted pushdown systems and their application to interprocedural dataflow analysis
-
to appear
-
T. Reps, S. Schwoon, S. Jha, and D. Melski. Weighted pushdown systems and their application to interprocedural dataflow analysis. Science of Computer Programming, 2005. to appear.
-
(2005)
Science of Computer Programming
-
-
Reps, T.1
Schwoon, S.2
Jha, S.3
Melski, D.4
-
19
-
-
17144385899
-
Symbolic bounds analysis of pointers, array indices, and accessed memory regions
-
Vancouver, BC, Canada, June ACM Press
-
R. Rugina and M. C. Rinard. Symbolic bounds analysis of pointers, array indices, and accessed memory regions. In Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation (PLDI'00), pages 182-195, Vancouver, BC, Canada, June 2000. ACM Press.
-
(2000)
Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation (PLDI'00)
, pp. 182-195
-
-
Rugina, R.1
Rinard, M.C.2
-
20
-
-
0001956132
-
-
R. Vall, E. Phong, C. Etienne, G. Laurie, H. Patrick, and L. Vijay. Soot - a Java bytecode optimization framework, 1999.
-
(1999)
Soot - A Java Bytecode Optimization Framework
-
-
Vall, R.1
Phong, E.2
Etienne, C.3
Laurie, G.4
Patrick, H.5
Vijay, L.6
-
21
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of the Networking and Distributed System Security Symposium (NDSS'00), San Diego, California, Feb. 2000.
-
Proceedings of the Networking and Distributed System Security Symposium (NDSS'00), San Diego, California, Feb. 2000
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
22
-
-
1542317050
-
Archer: Using symbolic, path-sensitive analysis to detect memory access errors
-
Sept.
-
Y. Xie, A. Chou, and D. Engler. Archer: Using symbolic, path-sensitive analysis to detect memory access errors. ACM SIGSOFT Software Engineering Notes, 28(5):327-336, Sept. 2003.
-
(2003)
ACM SIGSOFT Software Engineering Notes
, vol.28
, Issue.5
, pp. 327-336
-
-
Xie, Y.1
Chou, A.2
Engler, D.3
|