The case for analysis preserving language transformation
暂无分享,去创建一个
Trent Jaeger | Marco Pistoia | Xiaolan Zhang | Sam Weber | Liangzhao Zeng | Larry Koved | Guillaume Marceau
[1] David A. Wagner,et al. Model Checking One Million Lines of C Code , 2004, NDSS.
[2] Somesh Jha,et al. Buffer overrun detection using linear programming and static analysis , 2003, CCS '03.
[3] Sorin Lerner,et al. ESP: path-sensitive program verification in polynomial time , 2002, PLDI '02.
[4] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[5] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[6] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[7] John David Morgenthaler,et al. Static analysis for a software transformation tool , 1998 .
[8] Rainer Koschke,et al. Aiding program comprehension by static and dynamic feature analysis , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.
[9] Christopher W. Pidgeon,et al. DMS®: Program Transformations for Practical Scalable Software Evolution , 2002, IWPSE '02.
[10] Anneliese Amschler Andrews,et al. On the role of static analysis during software maintenance , 1999, Proceedings Seventh International Workshop on Program Comprehension.
[11] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[12] David A. Wagner,et al. Finding User/Kernel Pointer Bugs with Type Inference , 2004, USENIX Security Symposium.
[13] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[14] Sriram K. Rajamani,et al. Automatically validating temporal safety properties of interfaces , 2001, SPIN '01.
[15] Marco Pistoia,et al. Access rights analysis for Java , 2002, OOPSLA '02.
[16] Hausi A. Müller,et al. Ephedra: a c to java migration environment , 2002 .
[17] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[18] Patrick Cousot,et al. Abstract Interpretation Based Static Analysis Parameterized by Semantics , 1997, SAS.
[19] Dawson R. Engler,et al. A system and language for building system-specific, static analyses , 2002, PLDI '02.
[20] Premkumar T. Devanbu. GENOA - A Customizable, Language- And Front-end Independent Code Analyzer , 1992, International Conference on Software Engineering.
[21] Alexander Aiken,et al. A Toolkit for Constructing Type- and Constraint-Based Program Analyses , 1998, Types in Compilation.
[22] Alexander Aiken,et al. Flow-sensitive type qualifiers , 2002, PLDI '02.
[23] Trent Jaeger,et al. Using CQUAL for Static Analysis of Authorization Hook Placement , 2002, USENIX Security Symposium.
[24] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[25] Eran Yahav,et al. Verifying safety properties using separation and heterogeneous abstractions , 2004, PLDI '04.
[26] Daniel Le Métayer,et al. Verification of control flow based security properties , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[27] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[28] Alexander Aiken,et al. A theory of type qualifiers , 1999, PLDI '99.
[29] Robert Balzer,et al. On the Transformational Implementation approach to programming , 1976, ICSE '76.
[30] Barbara G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Programming Languages , 2003, CC.
[31] Marco Pistoia,et al. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection , 2005, ECOOP.
[32] Robert E. Strom,et al. Typestate: A programming language concept for enhancing software reliability , 1986, IEEE Transactions on Software Engineering.
[33] Guillaume Marceau,et al. INTELLECT : INTErmediate-Language LEvel C Translator , 2006 .
[34] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[35] Eran Yahav,et al. Typestate verification: Abstraction techniques and complexity results , 2005, Sci. Comput. Program..
[36] Laurie J. Hendren,et al. Taming control flow: a structured approach to eliminating goto statements , 1994, Proceedings of 1994 IEEE International Conference on Computer Languages (ICCL'94).
[37] Daniel M. Yellin,et al. Extending Typestate Checking Using Conditional Liveness Analysis , 1993, IEEE Trans. Software Eng..
[38] Paul D. Hovland,et al. Representation-independent program analysis , 2005, PASTE '05.
[39] Jack J. Dongarra,et al. JLAPACK-compiling LAPACK Fortran to Java , 1999, Sci. Program..
[40] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[41] Barbara G. Ryder,et al. Points-to analysis for Java using annotated constraints , 2001, OOPSLA '01.