Pointer analysis

Results: 174



#Item
151Published in Proc. of Conference on Compiler Construction, 2002, pp. 213–228.  CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs George C. Necula, Scott McPeak, S. P. Rahul, and Westley

Published in Proc. of Conference on Compiler Construction, 2002, pp. 213–228. CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs George C. Necula, Scott McPeak, S. P. Rahul, and Westley

Add to Reading List

Source URL: scottmcpeak.com

Language: English - Date: 2004-10-27 17:17:45
152Efficient Hybrid Typestate Analysis by Determining Continuation-Equivalent States ∗ Eric Bodden

Efficient Hybrid Typestate Analysis by Determining Continuation-Equivalent States ∗ Eric Bodden

Add to Reading List

Source URL: www.bodden.de

Language: English - Date: 2010-02-14 13:25:15
153Virtins Sound Card Instrument Manual

Virtins Sound Card Instrument Manual

Add to Reading List

Source URL: www.multi-instrument.com

Language: English - Date: 2014-04-21 01:58:59
154Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

Add to Reading List

Source URL: matt.might.net

Language: English - Date: 2014-03-23 14:11:52
155   COMP	
  7970	
  -­‐	
  003	
   Program	
  Analysis	
  and	
  Program	
  Transformation	
  for	
  Security	
   Syllabus	
   Instructor	
  

  COMP  7970  -­‐  003   Program  Analysis  and  Program  Transformation  for  Security   Syllabus   Instructor  

Add to Reading List

Source URL: www.munawarhafiz.com

Language: English - Date: 2012-04-25 21:47:39
156For Immediate Release  Pointer Telocation Ltd. Reports Record Results for the Financial Year 2013 

For Immediate Release Pointer Telocation Ltd. Reports Record Results for the Financial Year 2013 

Add to Reading List

Source URL: www.pointer.com

Language: English - Date: 2014-02-27 06:29:28
157BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
158Effective Typestate Verification in the Presence of Aliasing Stephen Fink∗ ∗ Eran Yahav∗ Nurit Dor†

Effective Typestate Verification in the Presence of Aliasing Stephen Fink∗ ∗ Eran Yahav∗ Nurit Dor†

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2006-07-26 21:44:02
159TYPE SAFETY IN THE LINUX KERNEL  A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES

TYPE SAFETY IN THE LINUX KERNEL A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-04-27 02:12:51
160Evaluating Static Analysis Defect Warnings On Production Software Nathaniel Ayewah, William Pugh J. David Morgenthaler, John Penix, YuQian Zhou

Evaluating Static Analysis Defect Warnings On Production Software Nathaniel Ayewah, William Pugh J. David Morgenthaler, John Penix, YuQian Zhou

Add to Reading List

Source URL: findbugs.cs.umd.edu

Language: English - Date: 2007-07-02 15:26:34