-
2
-
-
36549021031
-
An overview of the saturn project
-
A. Aiken, S. Bugrara, I. Dillig, T. Dillig, B. Hackett, and P. Hawkins. An overview of the Saturn project. In Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on program analysis for software tools and engineering, 2007.
-
(2007)
Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering
-
-
Aiken, A.1
Bugrara, S.2
Dillig, I.3
Dillig, T.4
Hackett, B.5
Hawkins, P.6
-
5
-
-
85077709845
-
The BLAST query language for software verification
-
D. Beyer, A. J. Chlipala, T. A. Henzinger, R. Jhala, and R. Majumdar. The BLAST query language for software verification. In Proceedings of the 11th International Static Analysis Symposium, 2004.
-
(2004)
Proceedings of the 11th International Static Analysis Symposium
-
-
Beyer, D.1
Chlipala, A.J.2
Henzinger, T.A.3
Jhala, R.4
Majumdar, R.5
-
8
-
-
0033697422
-
Bandera: Extracting finite-state models from java source code
-
J. C. Corbett, M. B. Dwyer, J. Hatcliff, S. Laubach, C. S. Pãsãreanu, Robby, and H. Zheng. Bandera: Extracting Finite-State Models from Java Source Code. In Proceedings of the 22nd International Conference on Software Engineering, 2000.
-
(2000)
Proceedings of the 22nd International Conference on Software Engineering
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Laubach, S.4
Pãsãreanu, C.S.5
Robby6
Zheng, H.7
-
10
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. R. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles
-
-
Engler, D.R.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
14
-
-
3142582577
-
Buffer overrun detection using linear programming and static analysis
-
V. Ganapathy, S. Jha, D. Chandler, D. Melski, and D. Vitek. Buffer overrun detection using linear programming and static analysis. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Ganapathy, V.1
Jha, S.2
Chandler, D.3
Melski, D.4
Vitek, D.5
-
20
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2005.
-
(2005)
13th ACM SIGSOFT Symposium on the Foundations of Software Engineering
-
-
Li, Z.1
Zhou, Y.2
-
22
-
-
53149140743
-
MUVi: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
-
S. Lu, S. Park, C. Hu, X. Ma, W. Jiang, Z. Li, R. A. Popa, and Y. Zhou. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. In Proceedings of the 21st ACM Symposium on Operating Systems Principles, 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
-
Lu, S.1
Park, S.2
Hu, C.3
Ma, X.4
Jiang, W.5
Li, Z.6
Popa, R.A.7
Zhou, Y.8
-
28
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: General security support for the linux kernel. In Proceedings of the 11th USENIX Security Symposium, 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
Smalley, S.4
Kroah-Hartman, G.5
|