Sciweavers

TGC
2007
Springer
13 years 11 months ago
Relational Analysis for Delivery of Services
Many techniques exist for statically computing properties of the evolution of processes expressed in process algebras. Static analysis has shown how to obtain useful results that c...
Flemming Nielson, Hanne Riis Nielson, Jörg Ba...
TGC
2007
Springer
13 years 11 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
SAS
2007
Springer
106views Formal Methods» more  SAS 2007»
13 years 11 months ago
Guided Static Analysis
In static analysis, the semantics of the program is expressed as a set ions. The equations are solved iteratively over some abstract domain. If ract domain is distributive and sati...
Denis Gopan, Thomas W. Reps
OOPSLA
2007
Springer
13 years 11 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
GI
2007
Springer
13 years 11 months ago
Test Automation Meets Static Analysis
: In this article we advocate an integrated approach for the automation of module or software integration testing and static analysis. It is illustrated how funmethods of static an...
Jan Peleska, Helge Löding, Tatiana Kotas
FASE
2007
Springer
13 years 11 months ago
Software Product Families: Towards Compositionality
- Static Analysis and Abstract Interpretation I (Chair: Sophia Drossopulou, room: Multicert) • FASE - Specification (Chair: Marsha Chechik, room: Cisco) • TACAS - Specificati...
Jan Bosch
ESOP
2007
Springer
13 years 11 months ago
Modular Shape Analysis for Dynamically Encapsulated Programs
We present a modular static analysis which identifies structural (shape) invariants for a subset of heap-manipulating programs. The subset is defined by means of a non-standard ...
Noam Rinetzky, Arnd Poetzsch-Heffter, Ganesan Rama...
TASE
2007
IEEE
13 years 11 months ago
Model Checking Software at Compile Time
Software has been under scrutiny by the verification community from various angles in the recent past. There are two major algorithmic approaches to ensure the correctness of and...
Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel ...
SCAM
2007
IEEE
13 years 11 months ago
SUDS: An Infrastructure for Creating Bug Detection Tools
SUDS is a powerful infrastructure for creating dynamic bug detection tools. It contains phases for both static analysis and dynamic instrumentation allowing users to create tools ...
Eric Larson
ACSAC
2007
IEEE
13 years 11 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda