-
2
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. S. Anna, and L. Bier. Clone detection using abstract syntax trees. In Proc. of the International Conference on Software Maintenance (ICSM), 1998.
-
(1998)
Proc. of the International Conference on Software Maintenance (ICSM)
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Anna, M.S.4
Bier, L.5
-
3
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
DOI 10.1109/TSE.2007.70725
-
S. Bellon, R. Koschke, I. C. Society, G. Antoniol, J. Krinke, I. C. Society, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Transactions on Software Engineering, 33:577-591, 2007. (Pubitemid 47322965)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
4
-
-
38549173275
-
Static detection of vulnerabilities in x86 executables
-
DOI 10.1109/ACSAC.2006.50, 4041173, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
M. Cova, V. Felmetsger, G. Banks, and G. Vigna. Static detection of vulnerabilities in x86 executables. In Proc. of Annual Computer Security Applications Conference (ACSAC), pages 269-278, 2006. (Pubitemid 351232921)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 269-278
-
-
Cova, M.1
Felmetsger, V.2
Banks, G.3
Vigna, G.4
-
5
-
-
84989525001
-
Indexing by latent semantic analysis
-
S. Deerwester, S. Dumais, G. Furnas, T. Landauer, and R. Harshman. Indexing by latent semantic analysis. Journal of the American Society for Information Science, 41(6):391-407, 1990.
-
(1990)
Journal of the American Society for Information Science
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.2
Furnas, G.3
Landauer, T.4
Harshman, R.5
-
6
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
DOI 10.1145/502059.502041
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proc. of ACM Symposium on Operating Systems Principles (SOSP), pages 57-72, 2001. (Pubitemid 33612605)
-
(2001)
Operating Systems Review (ACM)
, vol.35
, Issue.5
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
8
-
-
84857600799
-
SAGE: Whitebox fuzzing for security testing
-
P. Godefroid, M. Y. Levin, and D. Molnar. SAGE: whitebox fuzzing for security testing. Communications of the ACM, 55(3):40-44, 2012.
-
(2012)
Communications of the ACM
, vol.55
, Issue.3
, pp. 40-44
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.3
-
9
-
-
79957624835
-
Vulnerability detection systems: Think cyborg, not robot
-
S. Heelan. Vulnerability detection systems: Think cyborg, not robot. IEEE Security & Privacy, 9(3):74-77, 2011.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 74-77
-
-
Heelan, S.1
-
10
-
-
0003620778
-
-
Addison-Wesley, 2 edition
-
J. Hopcroft and J. Motwani, R. Ullmann. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2 edition, 2001.
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.1
Motwani, J.2
Ullmann, R.3
-
13
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, pages 654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
14
-
-
0030166953
-
Pattern matching for clone and concept detection
-
K. A. Kontogiannis, R. Demori, E. Merlo, M. Galler, and M. Bernstein. Pattern matching for clone and concept detection. Journal of Automated Software Engineering, 3:108, 1996.
-
(1996)
Journal of Automated Software Engineering
, vol.3
, pp. 108
-
-
Kontogiannis, K.A.1
Demori, R.2
Merlo, E.3
Galler, M.4
Bernstein, M.5
-
16
-
-
33645819206
-
Cp-miner: Finding copy-paste and related bugs in large-scale software code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, 32:176-192, 2006.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
18
-
-
84923564816
-
Finding security vulnerabilities in java applications with static analysis
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In Proc. of USENIX Security Symposium, 2005.
-
(2005)
Proc. of USENIX Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
21
-
-
0742276097
-
Inside the Slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer worm. IEEE Security and Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Proc. of Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
23
-
-
0029345191
-
ANTLR: A predicated-LL(k) parser generator
-
T. Parr and R. Quong. ANTLR: A predicated-LL(k) parser generator. Software Practice and Experience, 25: 789-810, 1995.
-
(1995)
Software Practice and Experience
, vol.25
, pp. 789-810
-
-
Parr, T.1
Quong, R.2
-
24
-
-
84872112733
-
-
visited April, 2012
-
rats. Rough auditing tool for security. Fortify Software Inc., https://www.fortify.com/ssa-elements/threat-intelligence/rats.html, visited April, 2012.
-
Rats. Rough Auditing Tool for Security
-
-
-
28
-
-
84949505015
-
ITS4: A static vulnerability scanner for C and C++ code
-
J. Viega, J. Bloch, Y. Kohno, and G. McGraw. ITS4: A static vulnerability scanner for C and C++ code. In Proc. of Annual Computer Security Applications Conference (ACSAC), pages 257-267, 2000.
-
(2000)
Proc. of Annual Computer Security Applications Conference (ACSAC)
, pp. 257-267
-
-
Viega, J.1
Bloch, J.2
Kohno, Y.3
McGraw, G.4
-
30
-
-
84872107422
-
-
visited April, 2012
-
D. A. Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/, visited April, 2012.
-
Flawfinder
-
-
Wheeler, D.A.1
-
31
-
-
24344496977
-
Automatic mining of source code repositories to improve bug finding techniques
-
DOI 10.1109/TSE.2005.63
-
C. C. Williams and J. K. Hollingsworth. Automatic mining of source code repositories to improve bug finding techniques. IEEE Transactions on Software Engineering, 31:466-480, 2005. (Pubitemid 41245069)
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.6
, pp. 466-480
-
-
Williams, C.C.1
Hollingsworth, J.K.2
-
32
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proc. of USENIX Security Symposium, 2006.
-
(2006)
Proc. of USENIX Security Symposium
-
-
Xie, Y.1
Aiken, A.2
|