-
2
-
-
0036086884
-
Using Programmer-Written Compiler Extensions to Catch Security Holes
-
Ashcraft, K., Engler, D.: Using Programmer-Written Compiler Extensions to Catch Security Holes. In: S&P (2002)
-
(2002)
S&P
-
-
Ashcraft, K.1
Engler, D.2
-
3
-
-
0030260329
-
Fast static analysis of c++ virtual function calls
-
Bacon, D.F., Sweeney, P.F.: Fast static analysis of c++ virtual function calls. In: OOPSLA, pp. 324-341 (1996)
-
(1996)
OOPSLA
, pp. 324-341
-
-
Bacon, D.F.1
Sweeney, P.F.2
-
4
-
-
67649859970
-
Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis
-
Chang, W., Streiff, B., Lin, C.: Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis. In: CCS (2008)
-
(2008)
CCS
-
-
Chang, W.1
Streiff, B.2
Lin, C.3
-
5
-
-
17144409441
-
Modular interprocedural pointer analysis using access paths: Design, implementation, and evaluation
-
Cheng, B., Hwu,W.W.: Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation. In: Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation, pp. 57-69 (2000)
-
(2000)
Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation
, pp. 57-69
-
-
Cheng, B.1
Hwu, W.W.2
-
6
-
-
85050550846
-
Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints
-
Cousot, P., Cousot, R.: Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints. In: POPL, pp. 238-252 (1977)
-
(1977)
POPL
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
7
-
-
84948958710
-
Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis
-
Olthoff, W. (ed.) ECOOP 1995. Springer, Heidelberg
-
Dean, J., Grove, D., Chambers, C.: Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In: Olthoff, W. (ed.) ECOOP 1995. LNCS, vol. 952, pp. 77-101. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.952
, pp. 77-101
-
-
Dean, J.1
Grove, D.2
Chambers, C.3
-
8
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
Denning, D.E.: A Lattice Model of Secure Information Flow. CACM 19(5) (1976)
-
(1976)
CACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
9
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
Denning, D.E., Denning, P.J.: Certification of Programs for Secure Information Flow. CACM 20(7) (1977)
-
(1977)
CACM
, vol.20
, Issue.7
-
-
Denning, D.E.1
Denning, P.J.2
-
10
-
-
0027061682
-
A Storeless Model of Aliasing and Its Abstractions Using Finite Representations of Right-regular Equivalence Relations
-
Deutsch, A.: A Storeless Model of Aliasing and Its Abstractions Using Finite Representations of Right-regular Equivalence Relations. In: ICCL (1992)
-
(1992)
ICCL
-
-
Deutsch, A.1
-
11
-
-
26444506226
-
Efficiently refactoring Java applications to use generic libraries
-
ECOOP 2005 - Object-Oriented Programming: 19th European Conference. Proceedings
-
Fuhrer, R., Tip, F., Kie?zun, A., Dolby, J., Keller, M.: Efficiently Refactoring Java Applications to Use Generic Libraries. In: Gao, X.-X. (ed.) ECOOP 2005. LNCS, vol. 3586, pp. 71-96. Springer, Heidelberg (2005) (Pubitemid 41435977)
-
(2005)
Lecture Notes in Computer Science
, vol.3586
, pp. 71-96
-
-
Fuhrer, R.1
Tip, F.2
Kiezun, A.3
Dolby, J.4
Keller, M.5
-
12
-
-
0020299523
-
Security Policies and Security Models
-
Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: S&P (1982)
-
(1982)
S&P
-
-
Goguen, J.A.1
Meseguer, J.2
-
13
-
-
80051918300
-
Saving the World Wide Web from Vulnerable JavaScript
-
Guarnieri, S., Pistoia, M., Tripp, O., Dolby, J., Teilhet, S.: Saving the World Wide Web from Vulnerable JavaScript. In: ISSTA (2011)
-
(2011)
ISSTA
-
-
Guarnieri, S.1
Pistoia, M.2
Tripp, O.3
Dolby, J.4
Teilhet, S.5
-
14
-
-
80051918429
-
Information Flow Control for Java Based on Path Conditions in Dependence Graphs
-
Hammer, C., Krinke, J., Snelting, G.: Information Flow Control for Java Based on Path Conditions in Dependence Graphs. In: S&P (2006)
-
(2006)
S&P
-
-
Hammer, C.1
Krinke, J.2
Snelting, G.3
-
15
-
-
0034837173
-
Demand-Driven Pointer Analysis
-
Heintze, N., Tardieu, O.: Demand-Driven Pointer Analysis. In: PLDI (2001)
-
(2001)
PLDI
-
-
Heintze, N.1
Tardieu, O.2
-
16
-
-
35548979013
-
Context-Sensitive Points-to Analysis: Is ItWorth It
-
Lhoták, O., Hendren, L.J.: Context-Sensitive Points-to Analysis: Is ItWorth It. In: CC (2006)
-
(2006)
CC
-
-
Lhoták, O.1
Hendren, L.J.2
-
17
-
-
84923564816
-
Finding Security Vulnerabilities in Java Applications with Static Analysis
-
Livshits, V.B., Lam, M.S.: Finding Security Vulnerabilities in Java Applications with Static Analysis. In: USENIX Security (2005)
-
(2005)
USENIX Security
-
-
Livshits, V.B.1
Lam, M.S.2
-
18
-
-
57349180506
-
Quantitative Information Flow as Network Flow Capacity
-
McCamant, S., Ernst, M.D.: Quantitative Information Flow as Network Flow Capacity. In: PLDI (2008)
-
(2008)
PLDI
-
-
McCamant, S.1
Ernst, M.D.2
-
19
-
-
33749823368
-
Static Approximation of Dynamically Generated Web Pages
-
Minamide, Y.: Static Approximation of Dynamically Generated Web Pages. In: WWW (2005)
-
(2005)
WWW
-
-
Minamide, Y.1
-
20
-
-
0032646625
-
JFlow: Practical Mostly-static Information Flow Control
-
Myers, A.C.: JFlow: Practical Mostly-static Information Flow Control. In: POPL (1999)
-
(1999)
POPL
-
-
Myers, A.C.1
-
21
-
-
0002934582
-
A Decentralized Model for Information Flow Control
-
Myers, A.C., Liskov, B.: A Decentralized Model for Information Flow Control. In: SOSP (1997)
-
(1997)
SOSP
-
-
Myers, A.C.1
Liskov, B.2
-
22
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: NDSS (2005)
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
23
-
-
26444502057
-
Interprocedural analysis for privileged code placement and tainted variable detection
-
ECOOP 2005 - Object-Oriented Programming: 19th European Conference. Proceedings
-
Pistoia, M., Flynn, R.J., Koved, L., Sreedhar, V.C.: Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In: Gao, X.-X. (ed.) ECOOP 2005. LNCS, vol. 3586, pp. 362-386. Springer, Heidelberg (2005) (Pubitemid 41435989)
-
(2005)
Lecture Notes in Computer Science
, vol.3586
, pp. 362-386
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
24
-
-
0029180939
-
Precise Interprocedural Dataflow Analysis via Graph Reachability
-
Reps, T., Horwitz, S., Sagiv, M.: Precise Interprocedural Dataflow Analysis via Graph Reachability. In: POPL (1995)
-
(1995)
POPL
-
-
Reps, T.1
Horwitz, S.2
Sagiv, M.3
-
26
-
-
84874360706
-
-
PhD thesis, State University of New York at Stony Brook, Stony Brook, NY, USA
-
Saha, D.: Incremental Evaluation of Tabled Logic Programs. PhD thesis, State University of New York at Stony Brook, Stony Brook, NY, USA (2006)
-
(2006)
Incremental Evaluation of Tabled Logic Programs
-
-
Saha, D.1
-
27
-
-
85084164620
-
Detecting Format String Vulnerabilities with Type Qualifiers
-
Shankar, U., Talwar, K., Foster, J.S., Wagner, D.: Detecting Format String Vulnerabilities with Type Qualifiers. In: USENIX Security (2001)
-
(2001)
USENIX Security
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
28
-
-
33750912954
-
Efficent Path Conditions in Dependence Graphs for Software Safety Analysis
-
Snelting, G., Robschink, T., Krinke, J.: Efficent Path Conditions in Dependence Graphs for Software Safety Analysis. TOSEM, 15(4) (2006)
-
(2006)
TOSEM
, vol.15
, Issue.4
-
-
Snelting, G.1
Robschink, T.2
Krinke, J.3
-
29
-
-
81455159309
-
F4F: Taint Analysis of Framework-based Web Applications
-
Sridharan, M., Artzi, S., Pistoia, M., Guarnieri, S., Tripp, O., Berg, R.: F4F: Taint Analysis of Framework-based Web Applications. In: OOPSLA (2011)
-
(2011)
OOPSLA
-
-
Sridharan, M.1
Artzi, S.2
Pistoia, M.3
Guarnieri, S.4
Tripp, O.5
Berg, R.6
-
31
-
-
33746049190
-
Refinement-based Context-sensitive Points-to Analysis for Java
-
June
-
Sridharan, M., Bodík, R.: Refinement-based Context-sensitive Points-to Analysis for Java. In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2006), Ottawa, ON, Canada, pp. 387-400 (June 2006)
-
(2006)
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2006), Ottawa, ON, Canada
, pp. 387-400
-
-
Sridharan, M.1
Bodík, R.2
-
32
-
-
80051944491
-
Path- and Index-sensitive String Analysis Based on Monadic Second-order Logic
-
Tateishi, T., Pistoia, M., Tripp, O.: Path- and Index-sensitive String Analysis Based on Monadic Second-order Logic. In: ISSTA (2011)
-
(2011)
ISSTA
-
-
Tateishi, T.1
Pistoia, M.2
Tripp, O.3
-
33
-
-
70450242742
-
TAJ: Effective Taint Analysis of Web Applications
-
Tripp, O., Pistoia, M., Fink, S.J., Sridharan, M., Weisman, O.: TAJ: Effective Taint Analysis of Web Applications. In: PLDI (2009)
-
(2009)
PLDI
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
34
-
-
0030370740
-
A Sound Type System for Secure Flow Analysis
-
Volpano, D., Irvine, C., Smith, G.: A Sound Type System for Secure Flow Analysis. JCS 4(2-3) (1996)
-
(1996)
JCS
, vol.4
, Issue.2-3
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
35
-
-
43649088003
-
Server-centric web frameworks: An overview
-
Vosloo, I., Kourie, D.G.: Server-centric web frameworks: An overview. ACM Comput. Surv. 40(2), 4:1-4:33 (2008)
-
(2008)
ACM Comput. Surv.
, vol.40
, Issue.2
-
-
Vosloo, I.1
Kourie, D.G.2
-
36
-
-
35449004893
-
Sound and Precise Analysis of Web Applications for Injection Vulnerabilities
-
Wassermann, G., Su, Z.: Sound and Precise Analysis of Web Applications for Injection Vulnerabilities. In: PLDI (2007)
-
(2007)
PLDI
-
-
Wassermann, G.1
Su, Z.2
-
37
-
-
57349153984
-
Static Detection of Cross-site Scripting Vulnerabilities
-
Wassermann, G., Su, Z.: Static Detection of Cross-site Scripting Vulnerabilities. In: ICSE 2008 (2008)
-
(2008)
ICSE 2008
-
-
Wassermann, G.1
Su, Z.2
-
38
-
-
8344251741
-
Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams
-
Whaley, J., Lam, M.S.: Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams. In: PLDI (2004)
-
(2004)
PLDI
-
-
Whaley, J.1
Lam, M.S.2
-
39
-
-
80051922052
-
Demand-driven context-sensitive alias analysis for java
-
Yan, D., Xu, G., Rountev, A.: Demand-driven context-sensitive alias analysis for java. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis, pp. 155-165 (2011)
-
(2011)
Proceedings of the 2011 International Symposium on Software Testing and Analysis
, pp. 155-165
-
-
Yan, D.1
Xu, G.2
Rountev, A.3
|