Pointer analysis

Results: 174



#Item
71Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome  Carnegie Mellon University Abstract

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
72Evaluating and Tuning a Static Analysis to Find Null ∗ Pointer Bugs David Hovemeyer, Jaime Spacco, and William Pugh Dept. of Computer Science University of Maryland

Evaluating and Tuning a Static Analysis to Find Null ∗ Pointer Bugs David Hovemeyer, Jaime Spacco, and William Pugh Dept. of Computer Science University of Maryland

Add to Reading List

Source URL: faculty.ycp.edu

Language: English - Date: 2014-08-22 12:24:22
73On the K-reachability Problem for Data Flow Analysis Reasoning may/must queries for combinatorial definitions Xiao Xiao, Charles Zhang Department of Computer Science and Engineering Hong Kong University of Science and Te

On the K-reachability Problem for Data Flow Analysis Reasoning may/must queries for combinatorial definitions Xiao Xiao, Charles Zhang Department of Computer Science and Engineering Hong Kong University of Science and Te

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2013-12-20 23:04:53
74BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-07-11 06:21:50
75Nullness Analysis of Java Bytecode via Supercompilation over Abstract Values? Ilya G. Klyuchnikov JetBrains; Keldysh Institute of Applied Mathematics of RAS  Abstract. Code inspections in the upcoming release of IntelliJ

Nullness Analysis of Java Bytecode via Supercompilation over Abstract Values? Ilya G. Klyuchnikov JetBrains; Keldysh Institute of Applied Mathematics of RAS Abstract. Code inspections in the upcoming release of IntelliJ

Add to Reading List

Source URL: meta2014.pereslavl.ru

Language: English - Date: 2014-06-15 20:00:00
76DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
77Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis ∗ Juan Caballero∗ , Heng Yin†∗ , Zhenkai Liang∗ , Dawn Song‡∗ Carnegie Mellon University † College of William and Ma

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis ∗ Juan Caballero∗ , Heng Yin†∗ , Zhenkai Liang∗ , Dawn Song‡∗ Carnegie Mellon University † College of William and Ma

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
78Improving Your Software Using Static Analysis to Find Bugs Brian Cole Reuven Lazarus David Hovemeyer ∗ Kristin Stephens

Improving Your Software Using Static Analysis to Find Bugs Brian Cole Reuven Lazarus David Hovemeyer ∗ Kristin Stephens

Add to Reading List

Source URL: faculty.ycp.edu

Language: English - Date: 2014-08-22 12:24:22
79BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
80Tracking Data Structures for Postmortem Analysis (NIER Track) Xiao Xiao, Jinguo Zhou, Charles Zhang Department of Computer Science and Engineering Hong Kong University of Science and Technology

Tracking Data Structures for Postmortem Analysis (NIER Track) Xiao Xiao, Jinguo Zhou, Charles Zhang Department of Computer Science and Engineering Hong Kong University of Science and Technology

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2013-09-22 04:01:34