Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Nurit Dor"'
Publikováno v:
ISSTA
The paper ``Effective Typestate Verification in the Presence of Aliasing'' was published in the International Symposium on Software Testing and Analysis (ISSTA) 2006 Proceedings, and has now been selected to receive the ISSTA 2019 Retrospective Impac
Publikováno v:
ISSTA
This article addresses the challenge of sound typestate verification, with acceptable precision, for real-world Java programs. We present a novel framework for verification of typestate properties, including several new techniques to precisely treat
Publikováno v:
SIGSOFT FSE
Statement st transitively depends on statement stseed if the execution of stseed may affect the execution of st. Computing transitive program dependences is a fundamental operation in many automatic software analysis tools. Existing tools find it cha
Publikováno v:
ISSTA
We describe a new tool that automatically identifies impact of customization changes, i.e., how changes affect software behavior. As opposed to existing static analysis tools that aim at aiding programmers or improve performance, our tool is designed
Autor:
Denis Gopan, Alexey Loginov, Tal Lev-Ami, Roman Manevich, Greta Yorsh, John Field, Noam Rinetzky, Eran Yahav, Thomas Reps, Nurit Dor, Ganesan Ramalingam, Reinhard Wilhelm, Mooly Sagiv
Publikováno v:
Verified Software: Theories, Tools, Experiments ISBN: 9783540691471
VSTTE
VSTTE
Strongly dynamic software systems are difficult to verify. By strongly dynamic, we mean that the actors in such systems change dynamically, that the resources used by such systems are dynamically allocated and deallocated, and that for both sets, no
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c964daa379c9d807edcec2ce5a937633
https://doi.org/10.1007/978-3-540-69149-5_11
https://doi.org/10.1007/978-3-540-69149-5_11
Publikováno v:
CASCON
One of the challenges when examining enterprise applications is the ability to understand the dependencies of these applications on external and internal resources such as database access or transaction activation. Inferring dependencies can be achie
Publikováno v:
ISSTA
In this paper, we present a new algorithm for tracking the flow of values through a program. Our algorithm represents a substantial improvement over the state of the art. Previously described value flow analyses that are control-flow sensitive do not
Publikováno v:
Tools and Algorithms for the Construction and Analysis of Systems ISBN: 9783540212997
TACAS
TACAS
We introduce a systematic approach to designing summarizing abstract numeric domains from existing numeric domains. Summarizing domains use summary dimensions to represent potentially unbounded collections of numeric objects. Such domains are of bene
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::470391d8d08556d7f37f05505ba4b946
https://doi.org/10.1007/978-3-540-24730-2_38
https://doi.org/10.1007/978-3-540-24730-2_38
Publikováno v:
PLDI
Erroneous string manipulations are a major source of software defects in C programs yielding vulnerabilities which are exploited by software viruses. We present C S tring S tatic V erifyer (CSSV), a tool that statically uncovers all string manipulati
Publikováno v:
Static Analysis ISBN: 9783540423140
SAS
SAS
All practical C programs use structures, arrays, and/or strings. At runtime, such objects are mapped into consecutive memory locations, hereafter referred to as buffers. Many software defects are caused by buffer overflow -- unintentional access to m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1f917fa6358c90230eed34c726227137
https://doi.org/10.1007/3-540-47764-0_12
https://doi.org/10.1007/3-540-47764-0_12