Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
SAS
2005
Springer
12 years 1 months ago
Secure Information Flow as a Safety Problem
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined th...
Tachio Terauchi, Alexander Aiken
SAS
2005
Springer
162views Formal Methods» more  SAS 2005»
12 years 1 months ago
Boolean Heaps
We show that the idea of predicates on heap objects can be cast in the framework of predicate abstraction. This leads to an alternative view on the underlying concepts of three-val...
Andreas Podelski, Thomas Wies
SAS
2005
Springer
12 years 1 months ago
Exploiting Sparsity in Polyhedral Analysis
Axel Simon, Andy King
SAS
2005
Springer
12 years 1 months ago
A Generic Framework for Interprocedural Analysis of Numerical Properties
Abstract. In his seminal paper [5], Granger presents an analysis which infers linear congruence relations between integer variables. For affine programs without guards, his analys...
Markus Müller-Olm, Helmut Seidl
SAS
2005
Springer
117views Formal Methods» more  SAS 2005»
12 years 1 months ago
The PER Model of Abstract Non-interference
Sebastian Hunt, Isabella Mastroeni
SAS
2005
Springer
134views Formal Methods» more  SAS 2005»
12 years 1 months ago
Using Dependent Types to Certify the Safety of Assembly Code
There are many source-level analyses or instrumentation tools that enforce various safety properties. In this paper we present an infrastructure that can be used to check independe...
Matthew Harren, George C. Necula
SAS
2005
Springer
127views Formal Methods» more  SAS 2005»
12 years 1 months ago
Banshee: A Scalable Constraint-Based Analysis Toolkit
Abstract. We introduce Banshee, a toolkit for constructing constraintbased analyses. Banshee’s novel features include a code generator for creating customized constraint resoluti...
John Kodumal, Alexander Aiken
SAS
2005
Springer
135views Formal Methods» more  SAS 2005»
12 years 1 months ago
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis
Abstract. We present our experience of combining, in a realistic setting, a static analyzer with a statistical analysis. This combination is in order to reduce the inevitable false...
Yungbum Jung, Jaehwang Kim, Jaeho Shin, Kwangkeun ...
SAS
2005
Springer
114views Formal Methods» more  SAS 2005»
12 years 1 months ago
Type-Safe Optimisation of Plugin Architectures
Programmers increasingly implement plugin architectures in type-safe object-oriented languages such as Java. A virtual machine can dynamically load class files containing plugins,...
Neal Glew, Jens Palsberg, Christian Grothoff
SAS
2005
Springer
12 years 1 months ago
A Relational Abstraction for Functions
Bertrand Jeannet, Denis Gopan, Thomas W. Reps
books