Databases Reference
In-Depth Information
[15] Sagar Chaki, Edmund Clarke, Alex Groce, Somesh Jha, and Helmut
Veith. Modular verification of software components in C. In Proceed-
ings of the International Conference on Software Engineering (ICSE),
pages 385{395, 2003.
[16] R. Y. Chang and A. Podgurski. Finding what's not there: a new ap-
proach to revealing neglected conditions in software. In Proceedings of
the International Symposium on Software Testing and Analysis (ISSTA),
pages 163{173, 2007.
[17] Ray-Yaung Chang, Andy Podgurski, and Jiong Yang. Discovering ne-
glected conditions in software by mining dependence graphs. IEEE Trans-
actions on Software Engineering (TSE), pages 579{596, 2008. http:
//doi.ieeecomputersociety.org/10.1109/TSE.2008.24 .
[18] Hao Chen. Lightweight Model Checking for Improving Software Security.
Ph.D. thesis, University of California, Berkeley, 2004.
[19] Hao Chen, Drew Dean, and David Wagner. Model checking one million
lines of C code. In Proceedings of the Network and Distributed System
Security Symposium (NDSS), pages 171{185, 2004.
[20] Hao Chen and David Wagner. MOPS: an infrastructure for examining
security properties of software. In Proceedings of the ACM Conference on
Computer and Communications Security (CCS), pages 235{244, 2002.
[21] Edmund Clarke, Daniel Kroening, Natasha Sharygina, and Karen Yorav.
SATABS: SAT-based predicate abstraction for ANSI-C. In Proceedings
of the International Conference on Tools and Algorithms for the Con-
struction and Analysis of Systems (TACAS), pages 570{574, 2005.
[22] Flaviu Cristian. Exception Handling and Tolerance of Software Faults.
In Software Fault Tolerance, Chapter 5. John Wiley and Sons, 1995.
[23] Manuvir Das, Sorin Lerner, and Mark Seigle. ESP: path-sensitive pro-
gram verification in polynomial time. In Proceedings of the Programming
Language Design and Implementation (PLDI), pages 57{68, 2002.
[24] Dawson Engler, Benjamin Chelf, Andy Chou, and Seth Hallem. Checking
system rules using system-specific, programmer-written compiler exten-
sions. In Proceedings of the USENIX Symposium on Operating Systems
Design (SOSP), pages 1{16, 2000.
[25] Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou, and Benjamin
Chelf. Bugs as deviant behavior: a general approach to inferring errors
in systems code. In Proceedings of the ACM Symposium on Operating
Systems Principles (SOSP), pages 57{72, 2001.
 
Search WWH ::




Custom Search