Diagnosys: automatic generation of a debugging interface to the Linux kernel
暂无分享,去创建一个
Julia L. Lawall | Tegawendé F. Bissyandé | Laurent Réveillère | Gilles Muller | J. Lawall | L. Réveillère | Gilles Muller | Laurent Réveillère
[1] Archana Ganapathi,et al. Windows XP Kernel Crash Analysis , 2006, LISA.
[2] Xi Wang,et al. Software fault isolation with API integrity and multi-principal modules , 2011, SOSP.
[3] Domenico Cotroneo,et al. Assessment and Improvement of Hang Detection in the Linux Operating System , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[4] Rob Williams,et al. Linux device drivers , 2006 .
[5] Wolfgang Küchlin,et al. Integrated Static Analysis for Linux Device Driver Verification , 2007, IFM.
[6] 簡聰富,et al. 物件導向軟體之架構(Object-Oriented Software Construction)探討 , 1989 .
[7] Christophe Calvès,et al. Faults in linux: ten years later , 2011, ASPLOS XVI.
[8] Julia L. Lawall,et al. WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code , 2009, DSN.
[9] Jean Arlat,et al. Characterization of the impact of faulty drivers on the robustness of the Linux kernel , 2004, International Conference on Dependable Systems and Networks, 2004.
[10] Valentin Goranko,et al. Logic in Computer Science: Modelling and Reasoning About Systems , 2007, J. Log. Lang. Inf..
[11] Ding Yuan,et al. SherLog: error diagnosis by connecting clues from run-time logs , 2010, ASPLOS XV.
[12] Greg Nelson,et al. Extended static checking for Java , 2002, PLDI '02.
[13] George Candea,et al. Efficient Testing of Recovery Code Using Fault Injection , 2011, TOCS.
[14] Junfeng Yang,et al. An empirical study of operating systems errors , 2001, SOSP.
[15] Claire Le Goues,et al. Specification Mining with Few False Positives , 2009, TACAS.
[16] Zhenmin Li,et al. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code , 2005, ESEC/FSE-13.
[17] Robert Hirschfeld,et al. Dynamic contract layers , 2010, SAC '10.
[18] K. Rustan M. Leino,et al. Houdini, an Annotation Assistant for ESC/Java , 2001, FME.
[19] Stephen McCamant,et al. The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..
[20] George Candea,et al. Testing Closed-Source Binary Device Drivers with DDT , 2010, USENIX Annual Technical Conference.
[21] Ding Yuan,et al. Improving Software Diagnosability via Log Enhancement , 2012, TOCS.
[22] Ding Yuan,et al. SherLog: error diagnosis by connecting clues from run-time logs , 2010, ASPLOS 2010.
[23] Julia L. Lawall,et al. Documenting and automating collateral evolutions in linux device drivers , 2008, Eurosys '08.
[24] Zhen Xiao,et al. HEALERS: a toolkit for enhancing the robustness and security of existing applications , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[25] Suresh Jagannathan,et al. Path-Sensitive Inference of Function Precedence Protocols , 2007, 29th International Conference on Software Engineering (ICSE'07).
[26] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.
[27] Leonid Ryzhyk,et al. Dingo: taming device drivers , 2009, EuroSys '09.
[28] Sriram K. Rajamani,et al. Thorough static analysis of device drivers , 2006, EuroSys.
[29] Alexander Aiken,et al. Verifying the Safety of User Pointer Dereferences , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[30] Bertrand Meyer,et al. Uncovering Hidden Contracts: The .NET Example , 2003, Computer.