-
1
-
-
84965037759
-
Set constraints: results, applications, and future directions
-
Springer-Verlag
-
A. Aiken, "Set constraints: results, applications, and future directions," PPCP'94: Principles and Practice of Constraint Programming, Springer-Verlag, pp.326-335.
-
PPCP'94: Principles and Practice of Constraint Programming
, pp. 326-335
-
-
Aiken, A.1
-
2
-
-
84957037636
-
A toolkit for constructing type- and constraint-based program analyses
-
Springer-Verlag
-
A. Aiken, M. Fähndrich, J.S. Foster, Z. Su, "A toolkit for constructing type- and constraint-based program analyses," TIC'98: Types in Compilation, Springer-Verlag, 1998, pp.78-96.
-
(1998)
TIC'98: Types in Compilation
, pp. 78-96
-
-
Aiken, A.1
Fähndrich, M.2
Foster, J.S.3
Su, Z.4
-
3
-
-
37148999612
-
Efficient Detection of All Pointer and Array Access Errors
-
ACM
-
T.M. Austin, S.E. Breach, G.S. Sohi, "Efficient Detection of All Pointer and Array Access Errors," PLDI'94, ACM.
-
PLDI'94
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
5
-
-
0344839461
-
The SUP-INF method in Presburger arithmetic
-
Memo ATP-18, Math Dept., U. Texas Austin, Dec
-
W.W. Bledsoe, "The SUP-INF method in Presburger arithmetic,", Memo ATP-18, Math Dept., U. Texas Austin, Dec. 1974.
-
(1974)
-
-
Bledsoe, W.W.1
-
6
-
-
85180760348
-
Abstract debugging of higher-order imperative languages
-
ACM
-
F. Bourdoncle, "Abstract debugging of higher-order imperative languages," PLDI'93, ACM.
-
PLDI'93
-
-
Bourdoncle, F.1
-
8
-
-
0006917147
-
-
Tech. report 83-254, PhD thesis, Computer Systems Lab, Stanford Univ
-
F. Chow, "A portable machine-independent global optimizer-Design and measurements," Tech. report 83-254, PhD thesis, Computer Systems Lab, Stanford Univ., 1983.
-
(1983)
A portable machine-independent global optimizer-Design and measurements
-
-
Chow, F.1
-
9
-
-
0028732490
-
Improved algorithms for linear inequalities with two variables per inequality
-
Dec
-
E. Cohen, N. Megiddo, "Improved algorithms for linear inequalities with two variables per inequality," SIAM J. Computing, vol.23 no.6, pp.1313-1347, Dec. 1994.
-
(1994)
SIAM J. Computing
, vol.23
, Issue.6
, pp. 1313-1347
-
-
Cohen, E.1
Megiddo, N.2
-
11
-
-
85035003357
-
Automatic Discovery of Linear Restraints among Variables of a Program
-
P. Cousot, N. Halbwachs, "Automatic Discovery of Linear Restraints among Variables of a Program," 5th ACM POPL, 1978, pp.84-97.
-
(1978)
5th ACM POPL
, pp. 84-97
-
-
Cousot, P.1
Halbwachs, N.2
-
12
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. 7th USENIX Security Conf., Jan. 1998.
-
(1998)
Proc. 7th USENIX Security Conf
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
13
-
-
85087323129
-
An Efficient Method of Computing Static Single Assignment Form
-
R. Cytron, J. Ferrante, B.K. Rosen, M.N. Wegman, F.K. Zadeck, "An Efficient Method of Computing Static Single Assignment Form," POPL'89.
-
POPL'89
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
14
-
-
0023386175
-
Constraint propagation with interval labels
-
July
-
E. Davis, "Constraint propagation with interval labels," Artificial Intelligence, vol.32 no.3, July 1987, pp.281-331.
-
(1987)
Artificial Intelligence
, vol.32
, Issue.3
, pp. 281-331
-
-
Davis, E.1
-
15
-
-
0004207324
-
Extended Static Checking
-
D.L. Detlefs, K.R.M. Leino, G. Nelson, J.B. Saxe, "Extended Static Checking," Compaq SRC Research Report 159, 1998.
-
(1998)
Compaq SRC Research Report
, vol.159
-
-
Detlefs, D.L.1
Leino, K.R.M.2
Nelson, G.3
Saxe, J.B.4
-
18
-
-
85011293817
-
LCLint: a tool for using specifications to check code
-
Dec
-
D. Evans, J. Guttag, J. Horning, Y.M. Tan, "LCLint: a tool for using specifications to check code," SIGSOFT Symp. on Foundations of Software Engineering, Dec. 1994.
-
(1994)
SIGSOFT Symp. on Foundations of Software Engineering
-
-
Evans, D.1
Guttag, J.2
Horning, J.3
Tan, Y.M.4
-
19
-
-
85086348218
-
Static detection of dynamic memory errors
-
D. Evans, "Static detection of dynamic memory errors," PLDI'96.
-
PLDI'96
-
-
Evans, D.1
-
21
-
-
0031654007
-
An automated approach for identifying potential vulnerabilities in software
-
May
-
A.K. Ghosh, T. O'Connor, G. McGraw, "An automated approach for identifying potential vulnerabilities in software," Proc. IEEE Symp. on Security and Privacy, May 1998, pp.104-114.
-
(1998)
Proc. IEEE Symp. on Security and Privacy
, pp. 104-114
-
-
Ghosh, A.K.1
O'Connor, T.2
McGraw, G.3
-
22
-
-
0027568719
-
Optimizing array bound checks using flow analysis
-
Mar.-Dec
-
R. Gupta, "Optimizing array bound checks using flow analysis," ACM Letters on Programming Languages and Systems, vol.2 no.1-4, Mar.-Dec. 1993, pp.135-150.
-
(1993)
ACM Letters on Programming Languages and Systems
, vol.2
, Issue.1-4
, pp. 135-150
-
-
Gupta, R.1
-
23
-
-
84974710035
-
Verification of linear hybrid systems by means of convex approximations
-
Springer-Verlag
-
N. Halbwachs, Y.-E. Proy, P. Raymond, "Verification of linear hybrid systems by means of convex approximations," SAS'94: Static Analysis Symp., Springer-Verlag, 1994, pp.223-237.
-
(1994)
SAS'94: Static Analysis Symp
, pp. 223-237
-
-
Halbwachs, N.1
Proy, Y.-E.2
Raymond, P.3
-
24
-
-
0031213092
-
Verification of real-time systems using linear relation analysis
-
Aug. Kluwer Academic Publishers
-
N. Halbwachs, Y.-E. Proy, P. Roumanoff, "Verification of real-time systems using linear relation analysis," CAV'93: Computer Aided Verification, Published in Formal Methods in System Design, vol.11 no.2, Aug. 1997, Kluwer Academic Publishers, pp.157-185.
-
(1997)
CAV'93: Computer Aided Verification, Published in Formal Methods in System Design
, vol.11
, Issue.2
, pp. 157-185
-
-
Halbwachs, N.1
Proy, Y.-E.2
Roumanoff, P.3
-
26
-
-
85180767776
-
STAN: A static analyzer for CLP(R) based on abstract interpretation
-
M. Handjieva, "STAN: A static analyzer for CLP(R) based on abstract interpretation," SAS'96: Static Analysis Symp.
-
SAS'96: Static Analysis Symp
-
-
Handjieva, M.1
-
27
-
-
0017494622
-
Compiler analysis of the value ranges for variables
-
May
-
W.H. Harrison, "Compiler analysis of the value ranges for variables," IEEE Trans. Software Engineering, vol.SE-3 no.3, May 1977, pp.243-250.
-
(1977)
IEEE Trans. Software Engineering
, vol.SE-3
, Issue.3
, pp. 243-250
-
-
Harrison, W.H.1
-
30
-
-
0028730912
-
Simple and fast algorithms for linear and integer programs with two variables per inequality
-
Dec
-
D.S. Hochbaum, J.S. Naor, "Simple and fast algorithms for linear and integer programs with two variables per inequality," SIAM J. Computing, vol.23 no.6, Dec. 1994, pp. 1179-1192.
-
(1994)
SIAM J. Computing
, vol.23
, Issue.6
, pp. 1179-1192
-
-
Hochbaum, D.S.1
Naor, J.S.2
-
31
-
-
85180753911
-
-
D. Holland, http://www.hcs.harvard.edu/dholland/computers/netkit.html.
-
-
-
Holland, D.1
-
32
-
-
44049111346
-
Constraint reasoning based on interval arithmetic: the tolerance propagation approach
-
E. Hyvönen, "Constraint reasoning based on interval arithmetic: the tolerance propagation approach," Artificial Intelligence, vol.58, 1992, pp.71-112.
-
(1992)
Artificial Intelligence
, vol.58
, pp. 71-112
-
-
Hyvönen, E.1
-
33
-
-
85180765878
-
-
http://www.infilsec.com/vulnerabilities/.
-
-
-
-
38
-
-
0025674986
-
Linear programming with two variables per inequality in poly-log time
-
Dec
-
G. Lueker, N. Megiddo, V. Ramachandran, "Linear programming with two variables per inequality in poly-log time," SIAM J. Computing, vol.19 no.6, Dec. 1990, pp.1000-1010.
-
(1990)
SIAM J. Computing
, vol.19
, Issue.6
, pp. 1000-1010
-
-
Lueker, G.1
Megiddo, N.2
Ramachandran, V.3
-
39
-
-
84976671430
-
Optimization of range checking
-
Proc. Symp. on Compiler Construction, June
-
V. Markstein, J. Cocke, P. Markstein, "Optimization of range checking," SIGPLAN Notices, vol.17 no.6, Proc. Symp. on Compiler Construction, June 1982, p.114-119.
-
(1982)
SIGPLAN Notices
, vol.17
, Issue.6
, pp. 114-119
-
-
Markstein, V.1
Cocke, J.2
Markstein, P.3
-
41
-
-
0025557712
-
An empirical study of the reliability of Unix utilities
-
Dec
-
B.P. Miller, L. Fredricksen, B. So, "An empirical study of the reliability of Unix utilities," CACM, vol.33 no.12, Dec. 1990, pp.32-44.
-
(1990)
CACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredricksen, L.2
So, B.3
-
42
-
-
0003577356
-
-
Tech. report CSTR-95-1268, U. Wisconsin, Apr
-
B.P. Miller, D. Koski, C.P. Lee, V. Maganty, R. Murphy, A. Natarajan, J. Steidl, "Fuzz revisited: a re-examination of the reliability of Unix utilities and services," Tech. report CSTR-95-1268, U. Wisconsin, Apr. 1995.
-
(1995)
Fuzz revisited: a re-examination of the reliability of Unix utilities and services
-
-
Miller, B.P.1
Koski, D.2
Lee, C.P.3
Maganty, V.4
Murphy, R.5
Natarajan, A.6
Steidl, J.7
-
43
-
-
85180765771
-
strlcpy and strlcat-Consistent, Safe, String Copy and Concatenation
-
USENIX Assoc., Berkeley, CA
-
T.C. Miller, T. de Raadt, "strlcpy and strlcat-Consistent, Safe, String Copy and Concatenation," FREENIX'99, USENIX Assoc., Berkeley, CA.
-
FREENIX'99
-
-
Miller, T.C.1
de Raadt, T.2
-
45
-
-
84961727822
-
The Design and Implementation of a Certifying Compiler
-
G.C. Necula, P. Lee, "The Design and Implementation of a Certifying Compiler," PLDI'98.
-
PLDI'98
-
-
Necula, G.C.1
Lee, P.2
-
46
-
-
85180781689
-
-
NuMega BoundsChecker, http://www.numega.com/products/aed/vc-more.shtml.
-
NuMega BoundsChecker
-
-
-
47
-
-
47349088015
-
Accurate Static Branch Prediction by Value Range Propagation
-
J. Patterson. "Accurate Static Branch Prediction by Value Range Propagation". PLDI'95, pp.67-78.
-
PLDI'95
, pp. 67-78
-
-
Patterson, J.1
-
48
-
-
85180790269
-
-
Phrack Magazine, Sep
-
Phrack Magazine, "The Frame Pointer Overwrite," Sep. 1999, vol.9 no.55.
-
(1999)
The Frame Pointer Overwrite
, vol.9
, Issue.55
-
-
-
50
-
-
0026974538
-
Eliminating false data dependences using the Omega test
-
W. Pugh, D. Wonnacott, "Eliminating false data dependences using the Omega test," PLDI'92, pp.140-151.
-
PLDI'92
, pp. 140-151
-
-
Pugh, W.1
Wonnacott, D.2
-
51
-
-
85180768699
-
-
Pure Atria Purify, http://www.rational.com/products/purify-unix/index.jtmpl.
-
Pure Atria Purify
-
-
-
52
-
-
0032304156
-
Automatic testing of reactive systems
-
P. Raymond, X. Nicollin, N. Halbwachs, D. Weber, "Automatic testing of reactive systems," Proc. 19th IEEE Real-Time Systems Symp., 1998, pp.200-209.
-
(1998)
Proc. 19th IEEE Real-Time Systems Symp
, pp. 200-209
-
-
Raymond, P.1
Nicollin, X.2
Halbwachs, N.3
Weber, D.4
-
54
-
-
84978282082
-
The effects of precision of pointer analysis
-
Springer-Verlag
-
M. Shapiro, S. Horwitz, "The effects of precision of pointer analysis," SAS'97: Static Analysis Symp., Springer-Verlag, pp.16-34.
-
SAS'97: Static Analysis Symp
, pp. 16-34
-
-
Shapiro, M.1
Horwitz, S.2
-
55
-
-
84976719228
-
On the SUP-INF method for proving Presburger formulas
-
Oct
-
R. Shostak, "On the SUP-INF method for proving Presburger formulas," J. ACM, vol.24 no.4, Oct. 1977, pp.529-543.
-
(1977)
J. ACM
, vol.24
, Issue.4
, pp. 529-543
-
-
Shostak, R.1
-
56
-
-
0019621772
-
Deciding linear inequalities by computing loop residues
-
Oct
-
R. Shostak, "Deciding linear inequalities by computing loop residues," J. ACM, vol.28 no.4, Oct. 1981, pp.769-779.
-
(1981)
J. ACM
, vol.28
, Issue.4
, pp. 769-779
-
-
Shostak, R.1
-
57
-
-
85180738970
-
Implementation of array bound checker
-
N. Sosuki, K. Ishihata, "Implementation of array bound checker," POPL'77, pp.132-143.
-
POPL'77
, pp. 132-143
-
-
Sosuki, N.1
Ishihata, K.2
-
58
-
-
0002868937
-
Constraint satisfaction using constraint logic programming
-
P. Van Hentenryck, H. Simonis, M. Dincbas, "Constraint satisfaction using constraint logic programming," Artificial Intelligence, vol.58, 1992, pp.113-159.
-
(1992)
Artificial Intelligence
, vol.58
, pp. 113-159
-
-
Van Hentenryck, P.1
Simonis, H.2
Dincbas, M.3
-
59
-
-
84905030599
-
Generalized constant propagation: A study in C
-
Apr
-
C. Verbrugge, P. Co, L.J. Hendren, "Generalized constant propagation: A study in C," Compiler Construction, 6th Intl. Conf., LNCS 1060, Apr. 1996, pp.74-90.
-
(1996)
Compiler Construction, 6th Intl. Conf., LNCS 1060
, pp. 74-90
-
-
Verbrugge, C.1
Co, P.2
Hendren, L.J.3
-
60
-
-
0031643965
-
Eliminating array bound checking through dependent types
-
H. Xi, F. Pfenning, "Eliminating array bound checking through dependent types," PLDI'98, pp.249-257.
-
PLDI'98
, pp. 249-257
-
-
Xi, H.1
Pfenning, F.2
-
61
-
-
85088333867
-
Dependent Types in Practical Programming
-
H. Xi, F. Pfenning, "Dependent Types in Practical Programming," POPL'99.
-
POPL'99
-
-
Xi, H.1
Pfenning, F.2
|