暂无分享,去创建一个
[1] Gian Luigi Ferrari,et al. Stack inspection and secure program transformations , 2004, International Journal of Information Security.
[2] Anindya Banerjee,et al. A Simple Semantics and Static Analysis for Java Security , 2001 .
[3] Aske Simon Christensen,et al. Precise Analysis of String Expressions , 2003, SAS.
[4] Hiroyuki Seki,et al. An efficient security verification method for programs with stack inspection , 2001, CCS '01.
[5] Li Xin,et al. Stacking-based Context-sensitive Points-to Analysis for Java , 2010 .
[6] Somesh Jha,et al. Weighted pushdown systems and their application to interprocedural dataflow analysis , 2003, Sci. Comput. Program..
[7] Kyung-Goo Doh,et al. A Practical String Analyzer by the Widening Approach , 2006, APLAS.
[8] Mizuhito Ogawa,et al. Conditional weighted pushdown systems and applications , 2010, PEPM '10.
[9] Ondrej Lhoták,et al. Scaling Java Points-to Analysis Using SPARK , 2003, CC.
[10] Marco Pistoia,et al. Access rights analysis for Java , 2002, OOPSLA '02.
[11] Byeong-Mo Chang,et al. Visualization of Permission Checks in Java Using Static Analysis , 2006, WISA.
[12] Gian Luigi Ferrari,et al. Static Analysis for Stack Inspection , 2001, ConCoord.
[13] Barbara G. Ryder,et al. Modular string-sensitive permission analysis with demand-driven precision , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[14] Marco Pistoia,et al. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection , 2005, ECOOP.
[15] Byeong-Mo Chang. Static check analysis for Java stack inspection , 2006, SIGP.
[16] Stefan Schwoon,et al. Model checking pushdown systems , 2002 .
[17] Sarfraz Khurshid,et al. Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution , 2008, APLAS.