-
4
-
-
84981578184
-
Dynamic slicing in the presence of unconstrained pointers
-
ACM Press
-
H. Agrawal, R. A. DeMillo, and E. H. Spafford. Dynamic slicing in the presence of unconstrained pointers. In Proceedings of the symposium on Testing, analysis, and verification, pages 60-73. ACM Press, 1991.
-
(1991)
Proceedings of the Symposium on Testing, Analysis, and Verification
, pp. 60-73
-
-
Agrawal, H.1
DeMillo, R.A.2
Spafford, E.H.3
-
5
-
-
0027606679
-
Debugging with dynamic slicing and backtracking
-
H. Agrawal, R. A. Demillo, and E. H. Spafford. Debugging with dynamic slicing and backtracking. Software - Practice and Experience, 23(6):589-616, 1993.
-
(1993)
Software - Practice and Experience
, vol.23
, Issue.6
, pp. 589-616
-
-
Agrawal, H.1
Demillo, R.A.2
Spafford, E.H.3
-
8
-
-
0004072686
-
-
Addison-Wesley Longman Publishing Co., Inc
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: principles, techniques, and tools. Addison-Wesley Longman Publishing Co., Inc., 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
9
-
-
0036709428
-
Recovery from malicious transactions
-
September/October
-
P. Ammann, S. Jajodia, and P. Liu. Recovery from malicious transactions. IEEE Transactions on Knowledge and Data Engineering, 14(5):1167-1185, September/October 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.5
, pp. 1167-1185
-
-
Ammann, P.1
Jajodia, S.2
Liu, P.3
-
12
-
-
85077731848
-
Unix security: Security in programming
-
M. Bishop. Unix security: Security in programming. SANS'96, 1996.
-
(1996)
SANS'96
-
-
Bishop, M.1
-
13
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev., 36(SI):211-224, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
14
-
-
15944399704
-
Towards a trusted immutable kernel extension (tike) for self-healing systems: A virtual machine approach
-
IEEE, June
-
J. Grizzard, E. Dodson, G. Conti, J. Levine, and H. Owen. Towards a trusted immutable kernel extension (tike) for self-healing systems: a virtual machine approach. In Proceedings of the Fifth IEEE Information Assurance Workshop (IAW), pages 444-446. IEEE, June 2004.
-
(2004)
Proceedings of the Fifth IEEE Information Assurance Workshop (IAW)
, pp. 444-446
-
-
Grizzard, J.1
Dodson, E.2
Conti, G.3
Levine, J.4
Owen, H.5
-
17
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
S. Horwitz, T. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. ACM Transactions on Programming Languages and Systems (TOPLAS), 12(1):26-60, 1990.
-
(1990)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.12
, Issue.1
, pp. 26-60
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
23
-
-
84963819598
-
Program slicing: Methods and applications
-
IEEE Computer Society Press, Los Alamitos, California, USA, Nov
-
A. D. Lucia. Program slicing: Methods and applications. In Proceedings of the First IEEE International Workshop on Source Code Analysis and Manipulation, pages 142-149. IEEE Computer Society Press, Los Alamitos, California, USA, Nov 2001.
-
(2001)
Proceedings of the First IEEE International Workshop on Source Code Analysis and Manipulation
, pp. 142-149
-
-
Lucia, A.D.1
-
24
-
-
20344382538
-
PSE: Explaining program failures via postmortem static analysis
-
ACM Press
-
R. Manevich, M. Sridharan, S. Adams, M. Das, and Z. Yang. Pse: Explaining program failures via postmortem static analysis. In Proceedings of SIGSOFT'04/FSE-12. ACM Press, 2004.
-
(2004)
Proceedings of SIGSOFT'04/FSE-12
-
-
Manevich, R.1
Sridharan, M.2
Adams, S.3
Das, M.4
Yang, Z.5
-
28
-
-
0000990322
-
A survey of program slicing techniques
-
F. Tip. A survey of program slicing techniques. Journal of programming languages, 3:121-189, 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
29
-
-
0020157396
-
Programmers use slices when debugging
-
M. Weiser. Programmers use slices when debugging. Communications, ACM, 25(7):446-452, 1982.
-
(1982)
Communications
, vol.25
, Issue.7
, pp. 446-452
-
-
Weiser, M.1
|