String Abstractions for String Verification
暂无分享,去创建一个
[1] Ali Sever. An Automata-Based Approach to Pattern Matching , 2013 .
[2] Zhendong Su,et al. Static Checking of Dynamically Generated Queries in Database Applications , 2004, ICSE 2004.
[3] Marcus Nilsson,et al. Regular Model Checking , 2000, CAV.
[4] Xiang Fu,et al. A Static Analysis Framework For Detecting SQL Injection Vulnerabilities , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[5] Michael D. Ernst,et al. HAMPI: a solver for string constraints , 2009, ISSTA.
[6] Steve Hanna,et al. A Symbolic Execution Framework for JavaScript , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] Nils Klarlund,et al. MONA: Monadic Second-Order Logic in Practice , 1995 .
[8] Ahmed Bouajjani,et al. Abstract Regular Model Checking , 2004, CAV.
[9] Andreas Podelski,et al. ACSAR: Software Model Checking with Transfinite Refinement , 2007, SPIN.
[10] Oscar H. Ibarra,et al. Relational String Verification Using Multi-track Automata , 2010, CIAA.
[11] Premkumar T. Devanbu,et al. Static checking of dynamically generated queries in database applications , 2004, Proceedings. 26th International Conference on Software Engineering.
[12] Michael Rodeh,et al. CSSV: towards a realistic tool for statically detecting all buffer overflows in C , 2003, PLDI '03.
[13] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[14] Yasuhiko Minamide,et al. Static approximation of dynamically generated Web pages , 2005, WWW '05.
[15] D. Shannon,et al. Abstracting Symbolic Execution with String Analysis , 2007, Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007).
[16] Oscar H. Ibarra,et al. Symbolic String Verification: Combining String Analysis and Size Analysis , 2009, TACAS.
[17] Aske Simon Christensen,et al. Precise Analysis of String Expressions , 2003, SAS.
[18] Tevfik Bultan,et al. Widening Arithmetic Automata , 2004, CAV.
[19] Fang Yu,et al. Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[20] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[21] Oscar H. Ibarra,et al. Symbolic String Verification: An Automata-Based Approach , 2008, SPIN.
[22] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[23] Fang Yu,et al. Patching vulnerabilities with sanitization synthesis , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[24] Borivoj Melichar,et al. Finding Common Motifs with Gaps Using Finite Automata , 2006, CIAA.
[25] Fang Yu,et al. Stranger: An Automata-Based String Analysis Tool for PHP , 2010, TACAS.
[26] Zhendong Su,et al. Sound and precise analysis of web applications for injection vulnerabilities , 2007, PLDI '07.