-
1
-
-
0004072686
-
-
(2nd Edition). Addison Wesley
-
Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. Compilers: Principles, Techniques, and Tools (2nd Edition). Addison Wesley, 2006.
-
(2006)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Lam, M.S.2
Sethi, R.3
Ullman, J.D.4
-
2
-
-
0034448902
-
ABCD: Eliminating array bounds checks on demand
-
ACM
-
Rastislav Bodik, Rajiv Gupta, and Vivek Sarkar. ABCD: eliminating array bounds checks on demand. In PLDI, pages 321-333. ACM, 2000.
-
(2000)
PLDI
, pp. 321-333
-
-
Bodik, R.1
Gupta, R.2
Sarkar, V.3
-
3
-
-
43449087959
-
Fast liveness checking for SSA-form programs
-
IEEE
-
Benoit Boissinot, Sebastian Hack, Daniel Grund, Benoit Dupont de Dinechin, and Fabrice Rastello. Fast liveness checking for SSA-form programs. In CGO, pages 35-44. IEEE, 2008.
-
(2008)
CGO
, pp. 35-44
-
-
Boissinot, B.1
Hack, S.2
Grund, D.3
De Dinechin, B.D.4
Rastello, F.5
-
4
-
-
84942509970
-
RICH: Automatically protecting against integer-based vulnerabilities
-
David Brumley, Dawn Xiaodong Song, Tzi cker Chiueh, Rob Johnson, and Huijia Lin. RICH: Automatically protecting against integer-based vulnerabilities. In NDSS. USENIX, 2007.
-
(2007)
NDSS. USENIX
-
-
Brumley, D.1
Xiaodong Song, D.2
Chiueh, T.3
Johnson, R.4
Lin, H.5
-
5
-
-
70349857932
-
BRICK: A binary tool for run-time detecting and locating integerbased vulnerability
-
Ping Chen, YiWang, Zhi Xin, Bing Mao, and Li Xie. BRICK: A binary tool for run-time detecting and locating integerbased vulnerability. In ARES, pages 208-215, 2009.
-
(2009)
ARES
, pp. 208-215
-
-
Chen, P.1
Wang, Y.2
Xin, Z.3
Mao, B.4
Xie, L.5
-
7
-
-
84976681893
-
Automatic construction of sparse data flow evaluation graphs
-
Jong-Deok Choi, Ron Cytron, and Jeanne Ferrante. Automatic construction of sparse data flow evaluation graphs. In POPL, pages 55-66, 1991.
-
(1991)
POPL
, pp. 55-66
-
-
Choi, J.-D.1
Cytron, R.2
Ferrante, J.3
-
8
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
ACM
-
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In POPL, pages 238-252. ACM, 1977.
-
(1977)
POPL
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
85035003357
-
Automatic discovery of linear restraints among variables of a program
-
ACM
-
P. Cousot and N. . Halbwachs. Automatic discovery of linear restraints among variables of a program. In POPL, pages 84-96. ACM, 1978.
-
(1978)
POPL
, pp. 84-96
-
-
Cousot, P.1
Halbwachs, N.2
-
10
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
Ron Cytron, Jeanne Ferrante, Barry K. Rosen, Mark N. Wegman, and F. Kenneth Zadeck. Efficiently computing static single assignment form and the control dependence graph. TOPLAS, 13(4):451-490, 1991.
-
(1991)
TOPLAS
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Kenneth Zadeck, F.5
-
11
-
-
84864257990
-
Understanding integer overflow in c/c++
-
IEEE
-
Will Dietz, Peng Li, John Regehr, and Vikram Adve. Understanding integer overflow in c/c++. In ICSE, pages 760-770. IEEE, 2012.
-
(2012)
ICSE
, pp. 760-770
-
-
Dietz, W.1
Li, P.2
Regehr, J.3
Adve, V.4
-
12
-
-
72749095310
-
The ariane 5 software failure
-
Mark Dowson. The ariane 5 software failure. SIGSOFT Softw. Eng. Notes, 22(2):84-, 1997.
-
(1997)
SIGSOFT Softw. Eng. Notes
, vol.22
, Issue.2
, pp. 84
-
-
Dowson, M.1
-
13
-
-
0023385308
-
The program dependence graph and its use in optimization
-
J. Ferrante, K. Ottenstein, and J. Warren. The program dependence graph and its use in optimization. TOPLAS, 9(3):319-349, 1987.
-
(1987)
TOPLAS
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.2
Warren, J.3
-
14
-
-
79955679388
-
Polynomial precise interval analysis revisited
-
T. Gawlitza, J. Leroux, J. Reineke, H. Seidl, G. Sutre, and R. Wilhelm. Polynomial precise interval analysis revisited. Efficient Algorithms, 1:422-437, 2009.
-
(2009)
Efficient Algorithms
, vol.1
, pp. 422-437
-
-
Gawlitza, T.1
Leroux, J.2
Reineke, J.3
Seidl, H.4
Sutre, G.5
Wilhelm, R.6
-
16
-
-
80054063222
-
Widening with thresholds for programs with complex control graphs
-
Springer-Verlag
-
Lies Lakhdar-Chaouch, Bertrand Jeannet, and Alain Girault. Widening with thresholds for programs with complex control graphs. In ATVA, pages 492-502. Springer-Verlag, 2011.
-
(2011)
ATVA
, pp. 492-502
-
-
Lakhdar-Chaouch, L.1
Jeannet, B.2
Girault, A.3
-
17
-
-
3042658703
-
LLVM: A compilation framework for lifelong program analysis & transformation
-
IEEE
-
Chris Lattner and Vikram S. Adve. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO, pages 75-88. IEEE, 2004.
-
(2004)
CGO
, pp. 75-88
-
-
Lattner, C.1
Adve, V.S.2
-
18
-
-
85008063768
-
Bitwidth cognizant architecture synthesis of custom hardware accelerators
-
S. Mahlke, R. Ravindran, M. Schlansker, R. Schreiber, and T. Sherwood. Bitwidth cognizant architecture synthesis of custom hardware accelerators. Computer-Aided Design of Integrated Circuits and Systems, 20(11):1355-1371, 2001.
-
(2001)
Computer-Aided Design of Integrated Circuits and Systems
, vol.20
, Issue.11
, pp. 1355-1371
-
-
Mahlke, S.1
Ravindran, R.2
Schlansker, M.3
Schreiber, R.4
Sherwood, T.5
-
19
-
-
33745881897
-
The octagon abstract domain
-
Antoine Miné. The octagon abstract domain. Higher Order Symbol. Comput. , 19:31-100, 2006.
-
(2006)
Higher Order Symbol. Comput.
, vol.19
, pp. 31-100
-
-
Miné, A.1
-
20
-
-
84893320590
-
Dynamic test generation to find integer bugs in x86 binary linux programs
-
USENIX
-
David Molnar, Xue Cong Li, and David A. Wagner. Dynamic test generation to find integer bugs in x86 binary linux programs. In SSYM, pages 67-82. USENIX, 2009.
-
(2009)
SSYM
, pp. 67-82
-
-
Molnar, D.1
Li, X.C.2
Wagner, D.A.3
-
21
-
-
35448955692
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
ACM
-
Nicholas Nethercote and Julian Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI, pages 89-100. ACM, 2007.
-
(2007)
PLDI
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
23
-
-
84976681533
-
Accurate static branch prediction by value range propagation
-
ACM
-
Jason R. C. Patterson. Accurate static branch prediction by value range propagation. In PLDI, pages 67-78. ACM, 1995.
-
(1995)
PLDI
, pp. 67-78
-
-
Patterson, J.R.C.1
-
24
-
-
0034446947
-
Bitwidth analysis with application to silicon compilation
-
ACM
-
Mark Stephenson, Jonathan Babb, and Saman Amarasinghe. Bitwidth analysis with application to silicon compilation. In PLDI, pages 108-120. ACM, 2000.
-
(2000)
PLDI
, pp. 108-120
-
-
Stephenson, M.1
Babb, J.2
Amarasinghe, S.3
-
25
-
-
27644524548
-
A class of polynomially solvable range constraints for interval analysis without widenings
-
Zhendong Su and David Wagner. A class of polynomially solvable range constraints for interval analysis without widenings. Theoretical Computeter Science, 345(1):122-138, 2005.
-
(2005)
Theoretical Computeter Science
, vol.345
, Issue.1
, pp. 122-138
-
-
Su, Z.1
Wagner, D.2
-
26
-
-
81355161883
-
Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
-
T. Wang, T. Wei, Z. Lin, andW. Zou. Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In NDSS. Internet Society, 2009.
-
(2009)
NDSS. Internet Society
-
-
Wang, T.1
Wei, T.2
Lin, Z.3
Zou, W.4
-
27
-
-
8744284121
-
-
Addison-Wesley Longman Publishing Co., Inc
-
Henry S. Warren. Hacker's Delight. Addison-Wesley Longman Publishing Co. , Inc. , 2002.
-
(2002)
Hacker's Delight
-
-
Warren, H.S.1
-
28
-
-
78049414309
-
Intpatch: Automatically fix integer-overflow-to-bufferoverflow vulnerability at compile-time
-
Springer-Verlag
-
Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, and Wei Zou. Intpatch: automatically fix integer-overflow-to-bufferoverflow vulnerability at compile-time. In ESORICS, pages 71-86. Springer-Verlag, 2010.
-
(2010)
ESORICS
, pp. 71-86
-
-
Zhang, C.1
Wang, T.2
Wei, T.3
Chen, Y.4
Zou, W.5
|