-
1
-
-
85077091103
-
-
Codesurfer. http://grammatech.com/research/technologies/codesurfer.
-
-
-
-
5
-
-
85077060079
-
-
OpenVPN. http://openvpn.net.
-
-
-
-
7
-
-
85077053724
-
-
Snort. http://snort.org.
-
-
-
-
8
-
-
85077073528
-
-
Squid. http://squid-cache.org.
-
-
-
-
10
-
-
79953069556
-
S2E: A platform for in-vivo multi-path analysis of software systems
-
V. Chipounov, V. Kuznetsov, and G. Candea. S2E: A platform for in-vivo multi-path analysis of software systems. In ASPLOS, 2011.
-
(2011)
ASPLOS
-
-
Chipounov, V.1
Kuznetsov, V.2
Candea, G.3
-
11
-
-
0027311335
-
Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects
-
J.-D. Choi, M. Burke, and P. Carini. Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects. In POPL, 1993.
-
(1993)
POPL
-
-
Choi, J.-D.1
Burke, M.2
Carini, P.3
-
12
-
-
0003011657
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In ACM SIGPLAN-SIGACT, 1977.
-
(1977)
ACM SIGPLAN-SIGACT
-
-
Cousot, P.1
Cousot, R.2
-
14
-
-
84919956517
-
Software dataplane verification
-
M. Dobrescu and K. Argyarki. Software dataplane verification. In NSDI, 2014.
-
(2014)
NSDI
-
-
Dobrescu, M.1
Argyarki, K.2
-
15
-
-
0023385308
-
The program dependence graph and its use in optimization
-
July
-
J. Ferrante, K. J. Ottenstein, and J. D. Warren. The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst., 9(3):319–349, July 1987.
-
(1987)
ACM Trans. Program. Lang. Syst.
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
16
-
-
84907314198
-
OpenNF: Enabling innovation in network function control
-
A. Gember-Jacobson, R. Viswanathan, C. Prakash, R. Grandl, J. Khalid, S. Das, and A. Akella. OpenNF: Enabling innovation in network function control. In SIGCOMM, 2014.
-
(2014)
SIGCOMM
-
-
Gember-Jacobson, A.1
Viswanathan, R.2
Prakash, C.3
Grandl, R.4
Khalid, J.5
Das, S.6
Akella, A.7
-
17
-
-
84890077627
-
Next stop, the cloud: Understanding modern web service deployment in ec2 and azure
-
K. He, A. Fisher, L. Wang, A. Gember, A. Akella, and T. Ristenpart. Next stop, the cloud: Understanding modern web service deployment in ec2 and azure. In Proceedings of the 2013 conference on Internet measurement conference, pages 177–190. ACM, 2013.
-
(2013)
Proceedings of the 2013 Conference on Internet Measurement Conference
, pp. 177-190
-
-
He, K.1
Fisher, A.2
Wang, L.3
Gember, A.4
Akella, A.5
Ristenpart, T.6
-
18
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
Jan
-
S. Horwitz, T. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. ACM Trans. Program. Lang. Syst., 12(1):26–60, Jan. 1990.
-
(1990)
ACM Trans. Program. Lang. Syst.
, vol.12
, Issue.1
, pp. 26-60
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
19
-
-
0010265763
-
The coign automatic distributed partitioning system
-
G. C. Hunt and M. L. Scott. The coign automatic distributed partitioning system. In OSDI, 1999.
-
(1999)
OSDI
-
-
Hunt, G.C.1
Scott, M.L.2
-
20
-
-
84959262784
-
Stateless network functions
-
M. Kablan, B. Caldwell, R. Han, H. Jamjoom, and E. Keller. Stateless network functions. In HotMiddlebox, 2015.
-
(2015)
HotMiddlebox
-
-
Kablan, M.1
Caldwell, B.2
Han, R.3
Jamjoom, H.4
Keller, E.5
-
21
-
-
0040291388
-
The Click modular router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Transactions on Computer Systems (TOCS), 18:263–297, 2000.
-
(2000)
ACM Transactions on Computer Systems (TOCS)
, vol.18
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
22
-
-
85077039095
-
Escape analysis on lists
-
Y. G. Park and B. Goldberg. Escape analysis on lists. In PLDI, 1992.
-
(1992)
PLDI
-
-
Park, Y.G.1
Goldberg, B.2
-
23
-
-
85084164413
-
BrO: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. In USENIX Security (SSYM), 1998.
-
(1998)
USENIX Security (SSYM)
-
-
Paxson, V.1
-
24
-
-
84893281460
-
PiCO replication: A high availability framework for middleboxes
-
S. Rajagopalan, D. Williams, and H. Jamjoom. Pico Replication: A high availability framework for middleboxes. In SoCC, 2013.
-
(2013)
SoCC
-
-
Rajagopalan, S.1
Williams, D.2
Jamjoom, H.3
-
26
-
-
85076716117
-
Split/Merge: System support for elastic execution in virtual middleboxes
-
S. Rajagopalan, D. Williams, H. Jamjoom, and A. Warfield. Split/Merge: System support for elastic execution in virtual middleboxes. In NSDI, 2013.
-
(2013)
NSDI
-
-
Rajagopalan, S.1
Williams, D.2
Jamjoom, H.3
Warfield, A.4
-
27
-
-
0029452074
-
Precise interprocedural chopping
-
T. Reps and G. Rosay. Precise interprocedural chopping. In ACM SIGSOFT, 1995.
-
(1995)
ACM SIGSOFT
-
-
Reps, T.1
Rosay, G.2
-
28
-
-
84983921942
-
Lifetime analysis of dynamically allocated objects
-
C. Ruggieri and T. P. Murtagh. Lifetime analysis of dynamically allocated objects. In POPL, 1988.
-
(1988)
POPL
-
-
Ruggieri, C.1
Murtagh, T.P.2
-
29
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
E. J. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
30
-
-
84962291312
-
Rollback recovery for middleboxes
-
J. Sherry, P. Gao, S. Basu, A. Panda, A. Krishnamurthy, C. Macciocco, M. Manesh, J. Martins, S. Ratnasamy, and L. R. S. Shenker. Rollback recovery for middleboxes. In SIGCOMM, 2015.
-
(2015)
SIGCOMM
-
-
Sherry, J.1
Gao, P.2
Basu, S.3
Panda, A.4
Krishnamurthy, A.5
Macciocco, C.6
Manesh, M.7
Martins, J.8
Ratnasamy, S.9
Shenker, L.R.S.10
-
31
-
-
0029717388
-
Points-to analysis in almost linear time
-
B. Steensgaard. Points-to analysis in almost linear time. In POPL, 1996.
-
(1996)
POPL
-
-
Steensgaard, B.1
-
32
-
-
85015943777
-
J-orchestra: Enhancing Java programs with distribution capabilities
-
Aug
-
E. Tilevich and Y. Smaragdakis. J-orchestra: Enhancing java programs with distribution capabilities. ACM Trans. Softw. Eng. Methodol., 19(1):1:1–1:40, Aug. 2009.
-
(2009)
ACM Trans. Softw. Eng. Methodol.
, vol.19
, Issue.1
, pp. 101-140
-
-
Tilevich, E.1
Smaragdakis, Y.2
|