skip to main content
Skip header Section
Principles of Program AnalysisNovember 1999
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-3-540-65410-0
Published:01 November 1999
Pages:
464
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Zhong L, Xiang C, Huang H, Shen B, Mugnier E and Zhou Y Effective Bug Detection with Unused Definitions Proceedings of the Nineteenth European Conference on Computer Systems, (720-735)
  2. ACM
    Marron M Toward Programming Languages for Reasoning: Humans, Symbolic Systems, and AI Agents Proceedings of the 2023 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, (136-152)
  3. ACM
    Sattler F, Böhm S, Schubert P, Siegmund N and Apel S (2023). SEAL: Integrating Program Analysis and Repository Mining, ACM Transactions on Software Engineering and Methodology, 32:5, (1-34), Online publication date: 30-Sep-2023.
  4. ACM
    Abo Khamis M, Ngo H, Pichler R, Suciu D and Remy Wang Y (2023). Convergence of Datalog over (Pre-) Semirings, ACM SIGMOD Record, 52:1, (75-82), Online publication date: 7-Jun-2023.
  5. Masud A (2023). The Duality in Computing SSA Programs and Control Dependency, IEEE Transactions on Software Engineering, 49:4, (1766-1781), Online publication date: 1-Apr-2023.
  6. ACM
    Runge T, Servetto M, Potanin A and Schaefer I (2022). Immutability and Encapsulation for Sound OO Information Flow Control, ACM Transactions on Programming Languages and Systems, 45:1, (1-35), Online publication date: 31-Mar-2023.
  7. ACM
    Deo N, Glavic B and Kennedy O Runtime provenance refinement for notebooks Proceedings of the 14th International Workshop on the Theory and Practice of Provenance, (1-4)
  8. ACM
    Abo Khamis M, Ngo H, Pichler R, Suciu D and Wang Y Convergence of Datalog over (Pre-) Semirings Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (105-117)
  9. ACM
    Chen B and Jiang Z (2021). A Survey of Software Log Instrumentation, ACM Computing Surveys, 54:4, (1-34), Online publication date: 31-May-2022.
  10. ACM
    Dubslaff C, Weis K, Baier C and Apel S Causality in configurable software systems Proceedings of the 44th International Conference on Software Engineering, (325-337)
  11. ACM
    Brachthäuser J, Schuster P, Lee E and Boruch-Gruszecki A (2022). Effects, capabilities, and boxes: from scope-based reasoning to type-based reasoning and back, Proceedings of the ACM on Programming Languages, 6:OOPSLA1, (1-30), Online publication date: 29-Apr-2022.
  12. Howar F, Jasper M, Mues M, Schmidt D and Steffen B (2021). The RERS challenge: towards controllable and scalable benchmark synthesis, International Journal on Software Tools for Technology Transfer (STTT), 23:6, (917-930), Online publication date: 1-Dec-2021.
  13. Yang C, Zhou S, Guo J and Kästner C Subtle bugs everywhere Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, (304-316)
  14. ACM
    Fang Z, Darais D, Near J and Zhang Y Zero Knowledge Static Program Analysis Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2951-2967)
  15. ACM
    Li Z, Wang J, Sun M and Lui J MirChecker: Detecting Bugs in Rust Programs via Static Analysis Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2183-2196)
  16. ACM
    Smaragdakis Y, Grech N, Lagouvardos S, Triantafyllou K and Tsatiris I (2021). Symbolic value-flow static analysis: deep, precise, complete modeling of Ethereum smart contracts, Proceedings of the ACM on Programming Languages, 5:OOPSLA, (1-30), Online publication date: 20-Oct-2021.
  17. ACM
    Song D, Lee W and Oh H Context-aware and data-driven feedback generation for programming assignments Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (328-340)
  18. ACM
    Pîrlea G, Kumar A and Sergey I Practical smart contract sharding with ownership and commutativity analysis Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (1327-1341)
  19. ACM
    Szabó T, Erdweg S and Bergmann G Incremental whole-program analysis in Datalog with lattices Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (1-15)
  20. ACM
    Guo Z, Wu K, Yan C and Yu X Releasing Locks As Early As You Can: Reducing Contention of Hotspots by Violating Two-Phase Locking Proceedings of the 2021 International Conference on Management of Data, (658-670)
  21. ACM
    Arceri V and Mastroeni I (2021). Analyzing Dynamic Code, ACM Transactions on Privacy and Security, 24:2, (1-38), Online publication date: 31-May-2021.
  22. ACM
    Pearce D (2021). A Lightweight Formalism for Reference Lifetimes and Borrowing in Rust, ACM Transactions on Programming Languages and Systems, 43:1, (1-73), Online publication date: 31-Mar-2021.
  23. Cheng X, Zhou M, Song X, Gu M and Sun J (2021). Automatic Integer Error Repair by Proper-Type Inference, IEEE Transactions on Dependable and Secure Computing, 18:2, (918-935), Online publication date: 1-Mar-2021.
  24. ACM
    Stiévenart Q and Madsen M (2020). Fuzzing channel-based concurrency runtimes using types and effects, Proceedings of the ACM on Programming Languages, 4:OOPSLA, (1-27), Online publication date: 13-Nov-2020.
  25. ACM
    Poesia G and Pereira F (2020). Dynamic dispatch of context-sensitive optimizations, Proceedings of the ACM on Programming Languages, 4:OOPSLA, (1-28), Online publication date: 13-Nov-2020.
  26. ACM
    Ketkar A, Tsantalis N and Dig D Understanding type changes in Java Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (629-641)
  27. ACM
    Runge T, Knüppel A, Thüm T and Schaefer I Lattice-Based Information Flow Control-by-Construction for Security-by-Design Proceedings of the 8th International Conference on Formal Methods in Software Engineering, (44-54)
  28. Champion A, Chiba T, Kobayashi N and Sato R (2020). ICE-Based Refinement Type Discovery for Higher-Order Functional Programs, Journal of Automated Reasoning, 64:7, (1393-1418), Online publication date: 1-Oct-2020.
  29. ACM
    Moreira S, Vasconcelos P and Florido M Resource Analysis for Lazy Evaluation with Polynomial Potential Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages, (104-114)
  30. ACM
    Contractor M and Fluet M Type- and Control-Flow Directed Defunctionalization Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages, (79-92)
  31. ACM
    Celik Z, Fernandes E, Pauley E, Tan G and McDaniel P (2019). Program Analysis of Commodity IoT Applications for Security and Privacy, ACM Computing Surveys, 52:4, (1-30), Online publication date: 31-Jul-2020.
  32. Sankaranarayanan S Reachability Analysis Using Message Passing over Tree Decompositions Computer Aided Verification, (604-628)
  33. ACM
    Ramanathan M, Clapp L, Barik R and Sridharan M Piranha Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice, (221-230)
  34. ACM
    Ramu R, Upadhyaya G, Nguyen H and Rajan H BCFA Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (1037-1048)
  35. ACM
    Brennan T, Saha S and Bultan T JVM fuzzing for JIT-induced side-channel detection Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (1011-1023)
  36. ACM
    Yu H, Chen Z, Fu X, Wang J, Su Z, Sun J, Huang C and Dong W Symbolic verification of message passing interface programs Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (1248-1260)
  37. ACM
    Yan J, Liu H, Pan L, Yan J, Zhang J and Liang B Multiple-entry testing of Android applications by constructing activity launching contexts Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (457-468)
  38. Jaiswal S, Khedker U and Chakraborty S (2020). Bidirectionality in flow-sensitive demand-driven analysis, Science of Computer Programming, 190:C, Online publication date: 1-May-2020.
  39. ACM
    Arceri V and Mastroeni I A sound abstract interpreter for dynamic code Proceedings of the 35th Annual ACM Symposium on Applied Computing, (1979-1988)
  40. Spoto F Enforcing Determinism of Java Smart Contracts Financial Cryptography and Data Security, (568-583)
  41. ACM
    Ly D, Kosmatov N, Signoles J and Loulergue F (2019). Soundness of a Dataflow Analysis for Memory Monitoring, ACM SIGAda Ada Letters, 38:2, (97-108), Online publication date: 6-Dec-2019.
  42. ACM
    Chatterjee K, Goharshady A, Goyal P, Ibsen-Jensen R and Pavlogiannis A (2019). Faster Algorithms for Dynamic Algebraic Queries in Basic RSMs with Constant Treewidth, ACM Transactions on Programming Languages and Systems, 41:4, (1-46), Online publication date: 5-Dec-2019.
  43. ACM
    Dimovski A Lifted static analysis using a binary decision diagram abstract domain Proceedings of the 18th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, (102-114)
  44. ACM
    Stojanov A, Rompf T and Püschel M A stage-polymorphic IR for compiling MATLAB-style dynamic tensor expressions Proceedings of the 18th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, (34-47)
  45. ACM
    Keidel S and Erdweg S (2019). Sound and reusable components for abstract interpretation, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-28), Online publication date: 10-Oct-2019.
  46. Arceri V, Pasqua M and Mastroeni I An Abstract Domain for Objects in Dynamic Programming Languages Formal Methods. FM 2019 International Workshops, (136-151)
  47. ACM
    Facchinetti L, Palmer Z and Smith S (2019). Higher-order Demand-driven Program Analysis, ACM Transactions on Programming Languages and Systems, 41:3, (1-53), Online publication date: 30-Sep-2019.
  48. ACM
    Antonino P, Gibson-Robinson T and Roscoe A (2019). Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving, ACM Transactions on Software Engineering and Methodology, 28:3, (1-43), Online publication date: 17-Aug-2019.
  49. Dessouky G, Gens D, Haney P, Persyn G, Kanuparthi A, Khattri H, Fung J, Sadeghi A and Rajendran J Hardfails Proceedings of the 28th USENIX Conference on Security Symposium, (213-230)
  50. ACM
    Chen J, Han J, Sun P, Zhang L, Hao D and Zhang L Compiler bug isolation via effective witness test program generation Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (223-234)
  51. ACM
    Lou Y, Chen J, Zhang L, Hao D and Zhang L History-driven build failure fixing: how far are we? Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, (43-54)
  52. ACM
    Wu M and Wang C Abstract interpretation under speculative execution Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, (802-815)
  53. Angerer F, Grimmer A, Prähofer H and Grünbacher P (2019). Change impact analysis for maintenance and evolution of variable software systems, Automated Software Engineering, 26:2, (417-461), Online publication date: 1-Jun-2019.
  54. Marcilio D, Bonifácio R, Monteiro E, Canedo E, Luz W and Pinto G Are static analysis violations really fixed? Proceedings of the 27th International Conference on Program Comprehension, (209-219)
  55. Jakobsson A (2019). Automatic Cost Analysis for Imperative BSP Programs, International Journal of Parallel Programming, 47:2, (184-212), Online publication date: 1-Apr-2019.
  56. Dimovski A, Brabrand C and Wąsowski A (2019). Finding suitable variability abstractions for lifted analysis, Formal Aspects of Computing, 31:2, (231-259), Online publication date: 1-Apr-2019.
  57. Teixeira F, Pereira F, Wong H, Nogueira J and Oliveira L (2022). SIoT, Future Generation Computer Systems, 92:C, (1172-1186), Online publication date: 1-Mar-2019.
  58. ACM
    Reynolds T, Procter A, Harrison W and Allwein G (2019). The Mechanized Marriage of Effects and Monads with Applications to High-assurance Hardware, ACM Transactions on Embedded Computing Systems, 18:1, (1-26), Online publication date: 28-Feb-2019.
  59. Cheng X, Zhou M, Song X, Gu M and Sun J (2019). Tolerating C Integer Error via Precision Elevation, IEEE Transactions on Computers, 68:2, (270-286), Online publication date: 1-Feb-2019.
  60. ACM
    Andreescu O, Jensen T, Lescuyer S and Montagu B (2019). Inferring frame conditions with static correlation analysis, Proceedings of the ACM on Programming Languages, 3:POPL, (1-29), Online publication date: 2-Jan-2019.
  61. ACM
    Bodin M, Gardner P, Jensen T and Schmitt A (2019). Skeletal semantics and their interpretations, Proceedings of the ACM on Programming Languages, 3:POPL, (1-31), Online publication date: 2-Jan-2019.
  62. ACM
    Baldan P, König B, Mika-Michalski C and Padoan T (2019). Fixpoint games on continuous lattices, Proceedings of the ACM on Programming Languages, 3:POPL, (1-29), Online publication date: 2-Jan-2019.
  63. ACM
    Faes M and Gross T Efficient VM-independent runtime checks for parallel programming Proceedings of the 10th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages, (5-15)
  64. ACM
    Rhein A, Liebig J, Janker A, Kästner C and Apel S (2018). Variability-Aware Static Analysis at Scale, ACM Transactions on Software Engineering and Methodology, 27:4, (1-33), Online publication date: 31-Oct-2018.
  65. ACM
    Kate S, Ore J, Zhang X, Elbaum S and Xu Z Phys: probabilistic physical unit assignment and inconsistency detection Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (563-573)
  66. ACM
    Besson F, Dang A and Jensen T Securing Compilation Against Memory Probing Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, (29-40)
  67. Ranzato F (2018). Abstracting Nash equilibria of supermodular games, Formal Methods in System Design, 53:2, (259-285), Online publication date: 1-Oct-2018.
  68. ACM
    Keidel S, Poulsen C and Erdweg S (2018). Compositional soundness proofs of abstract interpreters, Proceedings of the ACM on Programming Languages, 2:ICFP, (1-26), Online publication date: 30-Jul-2018.
  69. ACM
    Sherman E Redesigning Soot's data-flow analysis framework for abstract interpretation Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, (78-84)
  70. ACM
    Muske T, Talluri R and Serebrenik A Repositioning of static analysis alarms Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (187-197)
  71. ACM
    Wei F, Roy S, Ou X and Robby (2018). Amandroid, ACM Transactions on Privacy and Security, 21:3, (1-32), Online publication date: 2-Jun-2018.
  72. ACM
    Upadhyaya G and Rajan H Collective program analysis Proceedings of the 40th International Conference on Software Engineering, (620-631)
  73. ACM
    Lidman J and Mckee S (2017). Verifying Reliability Properties Using the Hyperball Abstract Domain, ACM Transactions on Programming Languages and Systems, 40:1, (1-29), Online publication date: 31-Mar-2018.
  74. ACM
    Burow N, Carr S, Nash J, Larsen P, Franz M, Brunthaler S and Payer M (2017). Control-Flow Integrity, ACM Computing Surveys, 50:1, (1-33), Online publication date: 31-Jan-2018.
  75. ACM
    Ibrar F, Saleem H, Castle S and Malik M A Study of Static Analysis Tools to Detect Vulnerabilities of Branchless Banking Applications in Developing Countries Proceedings of the Ninth International Conference on Information and Communication Technologies and Development, (1-5)
  76. Cheng X, Zhou M, Song X, Gu M and Sun J IntPTI: automatic integer error repair with proper-type inference Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (996-1001)
  77. ACM
    Keidel S and Erdweg S Toward abstract interpretation of program transformations Proceedings of the 2nd ACM SIGPLAN International Workshop on Meta-Programming Techniques and Reflection, (1-5)
  78. ACM
    Reynolds T, Procter A, Harrison W and Allwein G A core calculus for secure hardware Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, (122-131)
  79. ACM
    Zhang Q, Sun C and Su Z (2017). Skeletal program enumeration for rigorous compiler testing, ACM SIGPLAN Notices, 52:6, (347-361), Online publication date: 14-Sep-2017.
  80. ACM
    Klinik M, Jansen J and Plasmeijer R The Sky is the Limit Proceedings of the 29th Symposium on the Implementation and Application of Functional Programming Languages, (1-12)
  81. ACM
    Tóth M, Bozó I and Kozsik T Pattern Candidate Discovery and Parallelization Techniques Proceedings of the 29th Symposium on the Implementation and Application of Functional Programming Languages, (1-26)
  82. ACM
    Jasper M, Fecke M, Steffen B, Schordan M, Meijer J, Pol J, Howar F and Siegel S The RERS 2017 challenge and workshop (invited paper) Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, (11-20)
  83. Esparza J, Muscholl A and Walukiewicz I Static analysis of deterministic negotiations Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (1-12)
  84. ACM
    Kübler F, Müller P and Hermann B SootKeeper: runtime reusability for modular static analysis Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, (19-24)
  85. ACM
    Zhang Q, Sun C and Su Z Skeletal program enumeration for rigorous compiler testing Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, (347-361)
  86. Zhang H and Rountev A Analysis and testing of notifications in Android wear applications Proceedings of the 39th International Conference on Software Engineering, (347-357)
  87. ACM
    Assaf M, Naumann D, Signoles J, Totel É and Tronel F (2017). Hypercollecting semantics and its application to static analysis of information flow, ACM SIGPLAN Notices, 52:1, (874-887), Online publication date: 11-May-2017.
  88. ACM
    Wu Y, Guo W, Chan C and Tan K Fast Failure Recovery for Main-Memory DBMSs on Multicores Proceedings of the 2017 ACM International Conference on Management of Data, (267-281)
  89. Knoop J, Kovács L and Zwirchmayr J (2017). Replacing conjectures by positive knowledge, Journal of Symbolic Computation, 80:P1, (101-124), Online publication date: 1-May-2017.
  90. ACM
    Golan-Gueta G, Ramalingam G, Sagiv M and Yahav E (2017). Automatic Scalable Atomicity via Semantic Locking, ACM Transactions on Parallel Computing, 3:4, (1-29), Online publication date: 23-Mar-2017.
  91. Ghosh S, Vishnuvardhan P, Vadlamudi S, Hazra A, Dey S and Chakrabarti P (2017). RELSPEC, Design Automation for Embedded Systems, 21:1, (37-87), Online publication date: 1-Mar-2017.
  92. ACM
    de Wolff I and Hage J Refining types using type guards in TypeScript Proceedings of the 2017 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, (111-122)
  93. ACM
    Assaf M, Naumann D, Signoles J, Totel É and Tronel F Hypercollecting semantics and its application to static analysis of information flow Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, (874-887)
  94. Jakobsson A, Kosmatov N and Signoles J (2016). Fast as a shadow, expressive as a tree, Science of Computer Programming, 132:P2, (226-246), Online publication date: 15-Dec-2016.
  95. ACM
    Gaboardi M, Katsumata S, Orchard D, Breuvart F and Uustalu T (2016). Combining effects and coeffects via grading, ACM SIGPLAN Notices, 51:9, (476-489), Online publication date: 5-Dec-2016.
  96. ACM
    Darais D and Van Horn D (2016). Constructive Galois connections: taming the Galois connection framework for mechanized metatheory, ACM SIGPLAN Notices, 51:9, (311-324), Online publication date: 5-Dec-2016.
  97. ACM
    Kanvar V and Khedker U (2016). Heap Abstractions for Static Analysis, ACM Computing Surveys, 49:2, (1-47), Online publication date: 11-Nov-2016.
  98. ACM
    Kusano M and Wang C Flow-sensitive composition of thread-modular abstract interpretation Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, (799-809)
  99. Planas E, Cabot J and Gómez C (2016). Lightweight and static verification of UML executable models, Computer Languages, Systems and Structures, 46:C, (66-90), Online publication date: 1-Nov-2016.
  100. ACM
    Midtgaard J, Nielson F and Nielson H Iterated process analysis over lattice-valued regular expressions Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, (132-145)
  101. ACM
    Gaboardi M, Katsumata S, Orchard D, Breuvart F and Uustalu T Combining effects and coeffects via grading Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, (476-489)
  102. ACM
    Darais D and Van Horn D Constructive Galois connections: taming the Galois connection framework for mechanized metatheory Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, (311-324)
  103. ACM
    Chen J, Bai Y, Hao D, Zhang L, Zhang L, Xie B and Mei H Supporting oracle construction via static analysis Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (178-189)
  104. ACM
    Szabó T, Erdweg S and Voelter M IncA: a DSL for the definition of incremental program analyses Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (320-331)
  105. ACM
    Szabó T, Alperovich S, Voelter M and Erdweg S An extensible framework for variable-precision data-flow analyses in MPS Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (870-875)
  106. ACM
    Schrittwieser S, Katzenbeisser S, Kinder J, Merzdovnik G and Weippl E (2016). Protecting Software through Obfuscation, ACM Computing Surveys, 49:1, (1-37), Online publication date: 28-Jul-2016.
  107. ACM
    Hüttel H, Lanese I, Vasconcelos V, Caires L, Carbone M, Deniélou P, Mostrous D, Padovani L, Ravara A, Tuosto E, Vieira H and Zavattaro G (2016). Foundations of Session Types and Behavioural Contracts, ACM Computing Surveys, 49:1, (1-36), Online publication date: 28-Jul-2016.
  108. Gupta K and Nandivada V (2016). Lexical state analyzer for JavaCC grammars, Software—Practice & Experience, 46:6, (751-765), Online publication date: 1-Jun-2016.
  109. Gonçalves R, Batory D and Sobral J (2016). ReFlO, Software and Systems Modeling (SoSyM), 15:2, (377-395), Online publication date: 1-May-2016.
  110. ACM
    Darais D, Might M and Van Horn D (2015). Galois transformers and modular abstract interpreters: reusable metatheory for program analysis, ACM SIGPLAN Notices, 50:10, (552-571), Online publication date: 18-Dec-2015.
  111. ACM
    Avanzini M, Dal Lago U and Moser G (2015). Analysing the complexity of functional programs: higher-order meets first-order, ACM SIGPLAN Notices, 50:9, (152-164), Online publication date: 18-Dec-2015.
  112. ACM
    Golan-Gueta G, Ramalingam G, Sagiv M and Yahav E (2015). Automatic scalable atomicity via semantic locking, ACM SIGPLAN Notices, 50:8, (31-41), Online publication date: 18-Dec-2015.
  113. Weiβer D, Dahse J and Holz T Security Analysis of PHP Bytecode Protection Mechanisms Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404, (493-514)
  114. ACM
    Darais D, Might M and Van Horn D Galois transformers and modular abstract interpreters: reusable metatheory for program analysis Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (552-571)
  115. Erbatur S and Hofmann M GuideForce Revised Selected Papers of the SEFM 2015 Collocated Workshops on Software Engineering and Formal Methods - Volume 9509, (75-89)
  116. ACM
    Eichberg M, Hermann B, Mezini M and Glanz L Hidden truths in dead software paths Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (474-484)
  117. Bodei C, Brodo L and Focardi R Static Evidences for Attack Reconstruction Essays Dedicated to Pierpaolo Degano on Programming Languages with Applications to Biology and Security - Volume 9465, (162-182)
  118. ACM
    Allen N, Krishnan P and Scholz B Combining type-analysis with points-to analysis for analyzing Java library source-code Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, (13-18)
  119. ACM
    Grech N, Georgiou K, Pallister J, Kerrison S, Morse J and Eder K Static analysis of energy consumption for LLVM IR programs Proceedings of the 18th International Workshop on Software and Compilers for Embedded Systems, (12-21)
  120. Avidan E and Feitelson D From obfuscation to comprehension Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, (178-181)
  121. Zhang Y, Chen Z, Wang J, Dong W and Liu Z Regular property guided dynamic symbolic execution Proceedings of the 37th International Conference on Software Engineering - Volume 1, (643-653)
  122. ACM
    Jourdan J, Laporte V, Blazy S, Leroy X and Pichardie D (2015). A Formally-Verified C Static Analyzer, ACM SIGPLAN Notices, 50:1, (247-259), Online publication date: 11-May-2015.
  123. ACM
    Teixeira F, Machado G, Pereira F, Wong H, Nogueira J and Oliveira L SIoT Proceedings of the 14th International Conference on Information Processing in Sensor Networks, (310-321)
  124. ACM
    Jakobs M and Wehrheim H Programs from proofs of predicated dataflow analyses Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1729-1736)
  125. ACM
    Molitorisz K, Müller T and Tichy W Patty Proceedings of the Sixth International Workshop on Programming Models and Applications for Multicores and Manycores, (153-163)
  126. Ning Chen and Sunghun Kim (2015). STAR: Stack Trace Based Automatic Crash Reproduction via Symbolic Execution, IEEE Transactions on Software Engineering, 41:2, (198-220), Online publication date: 1-Feb-2015.
  127. ACM
    Golan-Gueta G, Ramalingam G, Sagiv M and Yahav E Automatic scalable atomicity via semantic locking Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (31-41)
  128. ACM
    Gange G, Navas J, Schachte P, Søndergaard H and Stuckey P (2015). Interval Analysis and Machine Arithmetic, ACM Transactions on Programming Languages and Systems, 37:1, (1-35), Online publication date: 20-Jan-2015.
  129. ACM
    Jourdan J, Laporte V, Blazy S, Leroy X and Pichardie D A Formally-Verified C Static Analyzer Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (247-259)
  130. ACM
    Lisper B, Masud A and Khanfar H Static Backward Demand-Driven Slicing Proceedings of the 2015 Workshop on Partial Evaluation and Program Manipulation, (115-126)
  131. ACM
    Van der Hoek H and Hage J Object-sensitive Type Analysis of PHP Proceedings of the 2015 Workshop on Partial Evaluation and Program Manipulation, (9-20)
  132. ACM
    Blazy S, Maroneze A and Pichardie D Verified Validation of Program Slicing Proceedings of the 2015 Conference on Certified Programs and Proofs, (109-117)
  133. ACM
    Nazaré H, Maffra I, Santos W, Barbosa L, Gonnord L and Quintão Pereira F (2014). Validation of memory accesses through symbolic analyses, ACM SIGPLAN Notices, 49:10, (791-809), Online publication date: 31-Dec-2015.
  134. ACM
    Chen S and Erwig M (2014). Type-based parametric analysis of program families, ACM SIGPLAN Notices, 49:9, (39-51), Online publication date: 26-Nov-2014.
  135. ACM
    Bergstrom L, Fluet M, Le M, Reppy J and Sandler N (2014). Practical and effective higher-order optimizations, ACM SIGPLAN Notices, 49:9, (81-93), Online publication date: 26-Nov-2014.
  136. ACM
    Wei F, Roy S, Ou X and Robby Amandroid Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (1329-1341)
  137. ACM
    Nazaré H, Maffra I, Santos W, Barbosa L, Gonnord L and Quintão Pereira F Validation of memory accesses through symbolic analyses Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, (791-809)
  138. ACM
    Ravanbakhsh H and Sankaranarayanan S Infinite horizon safety controller synthesis through disjunctive polyhedral abstract interpretation Proceedings of the 14th International Conference on Embedded Software, (1-10)
  139. ACM
    Adsit C and Fluet M An Efficient Type- and Control-Flow Analysis for System F Proceedings of the 26nd 2014 International Symposium on Implementation and Application of Functional Languages, (1-14)
  140. Sons K, Klein F, Sutter J and Slusallek P (2014). shade.js, Computer Graphics Forum, 33:7, (51-60), Online publication date: 1-Oct-2014.
  141. ACM
    Angerer F, Prähofer H, Lettner D, Grimmer A and Grünbacher P Identifying inactive code in product lines with configuration-aware system dependence graphs Proceedings of the 18th International Software Product Line Conference - Volume 1, (52-61)
  142. ACM
    Chen S and Erwig M Type-based parametric analysis of program families Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, (39-51)
  143. ACM
    Bergstrom L, Fluet M, Le M, Reppy J and Sandler N Practical and effective higher-order optimizations Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, (81-93)
  144. ACM
    Jakobs M and Wehrheim H Certification for configurable program analysis Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, (30-39)
  145. ACM
    Hofmann M and Chen W Abstract interpretation from Büchi automata Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
  146. ACM
    Bova S, Ganian R and Szeider S Model checking existential logic on partially ordered sets Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (1-10)
  147. ACM
    Pek E and Madhusudan P Explicit and symbolic techniques for fast and scalable points-to analysis Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, (1-6)
  148. ACM
    Zhang S and Zhang C Software bug localization with markov logic Companion Proceedings of the 36th International Conference on Software Engineering, (424-427)
  149. ACM
    Stolee K, Elbaum S and Dobos D (2014). Solving the Search for Source Code, ACM Transactions on Software Engineering and Methodology, 23:3, (1-45), Online publication date: 1-May-2014.
  150. ACM
    Midtgaard J, Brabrand C and Wasowski A Systematic derivation of static analyses for software product lines Proceedings of the 13th international conference on Modularity, (181-192)
  151. Brunel A, Gaboardi M, Mazza D and Zdancewic S A Core Quantitative Coeffect Calculus Proceedings of the 23rd European Symposium on Programming Languages and Systems - Volume 8410, (351-370)
  152. Suarez-Tangil G, Tapiador J, Peris-Lopez P and Blasco J (2014). Dendroid, Expert Systems with Applications: An International Journal, 41:4, (1104-1117), Online publication date: 1-Mar-2014.
  153. Mühlberg J and Lüttgen G (2014). Symbolic object code analysis, International Journal on Software Tools for Technology Transfer (STTT), 16:1, (81-102), Online publication date: 1-Feb-2014.
  154. Gustavsson A, Gustafsson J and Lisper B Timing Analysis of Parallel Software Using Abstract Execution Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 8318, (59-77)
  155. Pierro A and Wiklicky H Semantics of Probabilistic Programs Proceedings of the 11th Asian Symposium on Programming Languages and Systems - Volume 8301, (241-256)
  156. ACM
    Bouajjani A and Emmi M (2013). Analysis of Recursively Parallel Programs, ACM Transactions on Programming Languages and Systems, 35:3, (1-49), Online publication date: 1-Nov-2013.
  157. ACM
    Knoop J, Kovács L and Zwirchmayr J WCET squeezing Proceedings of the 21st International conference on Real-Time Networks and Systems, (161-170)
  158. LäMmel R, Thompson S and Kaiser M (2013). Programming errors in traversal programs over structured data, Science of Computer Programming, 78:10, (1770-1808), Online publication date: 1-Oct-2013.
  159. Carbone M, Christensen A, Nielson F, Nielson H, Hildebrandt T and SØlvkjær M ICT-powered Health Care Processes Revised Selected Papers of the Third International Symposium on Foundations of Health Information Engineering and Systems - Volume 8315, (59-68)
  160. ACM
    Pearce D A calculus for constraint-based flow typing Proceedings of the 15th Workshop on Formal Techniques for Java-like Programs, (1-7)
  161. ACM
    Kobayashi N (2013). Model Checking Higher-Order Programs, Journal of the ACM, 60:3, (1-62), Online publication date: 1-Jun-2013.
  162. Dubey A and Murthy P Computation and visualization of cause-effect paths Proceedings of the 8th International Workshop on Automation of Software Test, (139-145)
  163. Gilray T and Might M A Survey of Polyvariance in Abstract Interpretations Revised Selected Papers of the 14th International Symposium on Trends in Functional Programming - Volume 8322, (134-148)
  164. Lyde S and Might M Control-Flow Analysis with SAT Solvers Revised Selected Papers of the 14th International Symposium on Trends in Functional Programming - Volume 8322, (125-133)
  165. ACM
    Lo J, Wohlstadter E and Mesbah A Imagen Proceedings of the 22nd international conference on World Wide Web, (815-826)
  166. Popeea C and Chin W (2013). Dual analysis for proving safety and finding bugs, Science of Computer Programming, 78:4, (390-411), Online publication date: 1-Apr-2013.
  167. Wang Z, Pu G, Li J, Chen Y, Zhao Y, Chen M, Gu B, Yang M and He J (2013). A novel requirement analysis approach for periodic control systems, Frontiers of Computer Science: Selected Publications from Chinese Universities, 7:2, (214-235), Online publication date: 1-Apr-2013.
  168. ACM
    Disenfeld C and Katz S Specification and verification of event detectors and responses Proceedings of the 12th annual international conference on Aspect-oriented software development, (121-132)
  169. Quintao Pereira F, Rodrigues R and Sperle Campos V A fast and low-overhead technique to secure programs against integer overflows Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), (1-11)
  170. ACM
    Weijers J, Hage J and Holdermans S Security type error diagnosis for higher-order, polymorphic languages Proceedings of the ACM SIGPLAN 2013 workshop on Partial evaluation and program manipulation, (3-12)
  171. Brabrand C, Ribeiro M, Tolêdo T, Winther J and Borba P Intraprocedural dataflow analysis for software product lines Transactions on Aspect-Oriented Software Development X, (73-108)
  172. Harrison W, Procter A and Allwein G The confinement problem in the presence of faults Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering, (182-197)
  173. ACM
    Morrison G, Inggs C and Visser W Automated coverage calculation and test case generation Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, (84-93)
  174. Klint P, Roosendaal L and van Rozen R Game developers need lua air Proceedings of the 11th international conference on Entertainment Computing, (530-535)
  175. ACM
    Filipiuk P, Nielson F and Nielson H Layered fixed point logic Proceedings of the 14th symposium on Principles and practice of declarative programming, (45-54)
  176. Midtgaard J, Adams M and Might M A structural soundness proof for shivers's escape technique Proceedings of the 19th international conference on Static Analysis, (352-369)
  177. Calvert P and Mycroft A Control flow analysis for the join calculus Proceedings of the 19th international conference on Static Analysis, (181-197)
  178. ACM
    Thung F, Lucia , Lo D, Jiang L, Rahman F and Devanbu P To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, (50-59)
  179. Fioravanti F, Pettorossi A, Proietti M and Senni V (2012). Improving Reachability Analysis of Infinite State Systems by Specialization, Fundamenta Informaticae, 119:3-4, (281-300), Online publication date: 1-Aug-2012.
  180. ACM
    Jensen S, Jonsson P and Møller A Remedying the eval that men do Proceedings of the 2012 International Symposium on Software Testing and Analysis, (34-44)
  181. ACM
    Aziz B Application of formal analysis to enhancing trust in a complex grid-based operating system Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, (41-50)
  182. El-Zawawy M Heap slicing using type systems Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III, (592-606)
  183. Huang W, Dietl W, Milanova A and Ernst M Inference and checking of object ownership Proceedings of the 26th European conference on Object-Oriented Programming, (181-206)
  184. ACM
    Midtgaard J (2012). Control-flow analysis of functional programs, ACM Computing Surveys, 44:3, (1-33), Online publication date: 1-Jun-2012.
  185. Schmidt D (2012). Inverse-limit and topological aspects of abstract interpretation, Theoretical Computer Science, 430, (23-42), Online publication date: 1-Apr-2012.
  186. ACM
    Disenfeld C and Katz S A closer look at aspect interference and cooperation Proceedings of the 11th annual international conference on Aspect-oriented Software Development, (107-118)
  187. ACM
    Brabrand C, Ribeiro M, Tolêdo T and Borba P Intraprocedural dataflow analysis for software product lines Proceedings of the 11th annual international conference on Aspect-oriented Software Development, (13-24)
  188. Lu Y, Potter J, Zhang C and Xue J A type and effect system for determinism in multithreaded programs Proceedings of the 21st European conference on Programming Languages and Systems, (518-538)
  189. Petersen L and Glew N GC-Safe interprocedural unboxing Proceedings of the 21st international conference on Compiler Construction, (165-184)
  190. ACM
    Nielson H, Nielson F and Pilegaard H (2012). Flow Logic for Process Calculi, ACM Computing Surveys, 44:1, (1-39), Online publication date: 1-Jan-2012.
  191. Alglave J, Kroening D, Lugton J, Nimal V and Tautschnig M Soundness of data flow analyses for weak memory models Proceedings of the 9th Asian conference on Programming Languages and Systems, (272-288)
  192. Boissinot B, Brandner F, Darte A, de Dinechin B and Rastello F A non-iterative data-flow algorithm for computing liveness sets in strict SSA programs Proceedings of the 9th Asian conference on Programming Languages and Systems, (137-154)
  193. ACM
    Adams M, Keep A, Midtgaard J, Might M, Chauhan A and Dybvig R Flow-sensitive type recovery in linear-log time Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (483-498)
  194. ACM
    Adams M, Keep A, Midtgaard J, Might M, Chauhan A and Dybvig R (2011). Flow-sensitive type recovery in linear-log time, ACM SIGPLAN Notices, 46:10, (483-498), Online publication date: 18-Oct-2011.
  195. ACM
    Fehnker A, Huuck R and Rödiger W Model checking dataflow for malicious input Proceedings of the Workshop on Embedded Systems Security, (1-10)
  196. Skrypnyuk N and Nielson F Reachability for finite-state process algebras using static analysis Proceedings of the 5th international conference on Reachability problems, (231-244)
  197. Blackshear S, Chang B, Sankaranarayanan S and Sridharan M The flow-insensitive precision of Andersen's analysis in practice Proceedings of the 18th international conference on Static analysis, (60-76)
  198. Grabowski R, Hofmann M and Li K Type-Based enforcement of secure programming guidelines -- code injection prevention at SAP Proceedings of the 8th international conference on Formal Aspects of Security and Trust, (182-197)
  199. ACM
    Van Horn D and Might M (2011). Abstracting abstract machines, Communications of the ACM, 54:9, (101-109), Online publication date: 1-Sep-2011.
  200. Esparza J and Luttenberger M Solving fixed-point equations by derivation tree analysis Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (19-35)
  201. ACM
    Babić D, Martignoni L, McCamant S and Song D Statically-directed dynamic automated test generation Proceedings of the 2011 International Symposium on Software Testing and Analysis, (12-22)
  202. Sankaranarayanan S and Tiwari A Relational abstractions for continuous and hybrid systems Proceedings of the 23rd international conference on Computer aided verification, (686-702)
  203. ACM
    Beyer M and Glesner S Static run-time mode extraction by state partitioning in synchronous process networks Proceedings of the 14th International Workshop on Software and Compilers for Embedded Systems, (28-37)
  204. Tóth M and Bozó I Static analysis of complex software systems implemented in erlang Proceedings of the 4th Summer School conference on Central European Functional Programming School, (440-498)
  205. Filipiuk P, Terepeta M, Nielson H and Nielson F Galois connections for flow algebras Proceedings of the joint 13th IFIP WG 6.1 and 30th IFIP WG 6.1 international conference on Formal techniques for distributed systems, (138-152)
  206. Herrmann C and Hammond K Counter automata for parameterised timing analysis of box-based systems Proceedings of the Second international conference on Foundational and Practical Aspects of Resource Analysis, (126-141)
  207. ACM
    Nielson F, Nanz S and Nielson H (2011). Modal abstractions of concurrent behavior, ACM Transactions on Computational Logic, 12:3, (1-40), Online publication date: 1-May-2011.
  208. ACM
    Geilen M, Tripakis S and Wiggers M The earlier the better Proceedings of the 14th international conference on Hybrid systems: computation and control, (23-32)
  209. Miné A Static analysis of run-time errors in embedded critical parallel C programs Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software, (398-418)
  210. ACM
    Sergey I and Clarke D From type checking by recursive descent to type checking with an abstract machine Proceedings of the Eleventh Workshop on Language Descriptions, Tools and Applications, (1-7)
  211. ACM
    Nguyen D and Pingali K (2011). Synthesizing concurrent schedulers for irregular algorithms, ACM SIGPLAN Notices, 46:3, (333-344), Online publication date: 17-Mar-2011.
  212. ACM
    Nguyen D and Pingali K (2011). Synthesizing concurrent schedulers for irregular algorithms, ACM SIGARCH Computer Architecture News, 39:1, (333-344), Online publication date: 17-Mar-2011.
  213. ACM
    Nguyen D and Pingali K Synthesizing concurrent schedulers for irregular algorithms Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, (333-344)
  214. ACM
    Ong C and Ramsay S Verifying higher-order functional programs with pattern-matching algebraic data types Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (587-598)
  215. ACM
    Ong C and Ramsay S (2011). Verifying higher-order functional programs with pattern-matching algebraic data types, ACM SIGPLAN Notices, 46:1, (587-598), Online publication date: 26-Jan-2011.
  216. ACM
    Edvinsson M, Lundberg J and Löwe W Parallel points-to analysis for multi-core machines Proceedings of the 6th International Conference on High Performance and Embedded Architectures and Compilers, (45-54)
  217. Bartoletti M, Degano P, Ferrari G and Zunino R Call-by-contract for service discovery, orchestration and recovery Rigorous software engineering for service-oriented systems, (232-261)
  218. Zhou L, Ping J, Xiao H, Wang Z, Pu G and Ding Z Automatically testing web services choreography with assertions Proceedings of the 12th international conference on Formal engineering methods and software engineering, (138-154)
  219. Chen Y and Sanders J UTP and sustainability Proceedings of the Third international conference on Unifying theories of programming, (46-73)
  220. Toben T A formal model of reliable sensor perception Proceedings of the 5th European conference on Smart sensing and context, (94-107)
  221. ACM
    Li G and Gopalakrishnan G Scalable SMT-based verification of GPU kernel functions Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, (187-196)
  222. Puffitsch W, Huber B and Schoeberl M Worst-case analysis of heap allocations Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II, (464-478)
  223. Lisper B, Ermedahl A, Schreiner D, Knoop J and Gliwa P Practical experiences of applying source-level WCET flow analysis on industrial code Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II, (449-463)
  224. ACM
    Méndez-Lojo M, Mathew A and Pingali K (2010). Parallel inclusion-based points-to analysis, ACM SIGPLAN Notices, 45:10, (428-443), Online publication date: 17-Oct-2010.
  225. ACM
    Méndez-Lojo M, Mathew A and Pingali K Parallel inclusion-based points-to analysis Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (428-443)
  226. Tran T and Steffen M Safe commits for transactional featherweight Java Proceedings of the 8th international conference on Integrated formal methods, (290-304)
  227. ACM
    Esparza J, Kiefer S and Luttenberger M (2010). Newtonian program analysis, Journal of the ACM, 57:6, (1-47), Online publication date: 1-Oct-2010.
  228. Besson F, Dufay G, Jensen T and Pichardie D (2010). Verifying resource access control on mobile interactive devices, Journal of Computer Security, 18:6, (971-998), Online publication date: 21-Sep-2010.
  229. Crampton J and Huth M An authorization framework resilient to policy evaluation failures Proceedings of the 15th European conference on Research in computer security, (472-487)
  230. Might M Abstract interpreters for free Proceedings of the 17th international conference on Static analysis, (407-421)
  231. Jovanovic N, Kruegel C and Kirda E (2010). Static analysis for detecting taint-style vulnerabilities in web applications, Journal of Computer Security, 18:5, (861-907), Online publication date: 1-Sep-2010.
  232. James M, Springer P and Zima H Adaptive fault tolerance for many-core based space-borne computing Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II, (260-274)
  233. Di Pierro A, Hankin C and Wiklicky H Probabilistic semantics and program analysis Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems, (1-42)
  234. Plociniczak H and Eisenbach S JErlang Proceedings of the 12th international conference on Coordination Models and Languages, (61-75)
  235. Banda G and Gallagher J Constraint-based abstract semantics for temporal logic Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning, (27-45)
  236. ACM
    Schlickling M and Pister M (2010). Semi-automatic derivation of timing models for WCET analysis, ACM SIGPLAN Notices, 45:4, (67-76), Online publication date: 13-Apr-2010.
  237. ACM
    Schlickling M and Pister M Semi-automatic derivation of timing models for WCET analysis Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, compilers, and tools for embedded systems, (67-76)
  238. Castle T and Johnson C Positional effect of crossover and mutation in grammatical evolution Proceedings of the 13th European conference on Genetic Programming, (26-37)
  239. ACM
    Herold S Checking architectural compliance in component-based systems Proceedings of the 2010 ACM Symposium on Applied Computing, (2244-2251)
  240. Asăvoae I and Asăvoae M Collecting semantics under predicate abstraction in the K framework Proceedings of the 8th international conference on Rewriting logic and its applications, (123-139)
  241. ACM
    Sadat-Mohtasham H and Hoover H (2009). Transactional pointcuts, ACM SIGPLAN Notices, 45:2, (35-44), Online publication date: 1-Feb-2010.
  242. Wachter B and Zhang L Best probabilistic transformers Proceedings of the 11th international conference on Verification, Model Checking, and Abstract Interpretation, (362-379)
  243. Nielson H and Nielson F (2009). A monotone framework for CCS, Computer Languages, Systems and Structures, 35:4, (365-394), Online publication date: 1-Dec-2009.
  244. ACM
    Li S and Tan G Finding bugs in exceptional situations of JNI programs Proceedings of the 16th ACM conference on Computer and communications security, (442-452)
  245. ACM
    Brauer J, Schlich B, Reinbacher T and Kowalewski S Stack bounds analysis for microcontroller assembly code Proceedings of the 4th Workshop on Embedded Systems Security, (1-9)
  246. ACM
    Sadat-Mohtasham H and Hoover H Transactional pointcuts Proceedings of the eighth international conference on Generative programming and component engineering, (35-44)
  247. Stone A, Strout M and Behere S (2009). May/must analysis and the DFAGen data-flow analysis generator, Information and Software Technology, 51:10, (1440-1453), Online publication date: 1-Oct-2009.
  248. Lundberg J, Gutzmann T, Edvinsson M and Löwe W (2009). Fast and precise points-to analysis, Information and Software Technology, 51:10, (1428-1439), Online publication date: 1-Oct-2009.
  249. Brauer J, Huuck R and Schlich B (2009). Interprocedural Pointer Analysis in Goanna, Electronic Notes in Theoretical Computer Science (ENTCS), 254, (65-83), Online publication date: 1-Oct-2009.
  250. ACM
    Garbervetsky D, Yovine S, Braberman V, Rouaux M and Taboada A On transforming Java-like programs into memory-predictable code Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, (140-149)
  251. Hassine J Early schedulability analysis with timed use case maps Proceedings of the 14th international SDL conference on Design for motes and mobiles, (98-114)
  252. ACM
    Probst C and Hansen R Fluid information systems Proceedings of the 2009 workshop on New security paradigms workshop, (125-132)
  253. ACM
    Kobayashi N Model-checking higher-order functions Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, (25-36)
  254. ACM
    Nyström J Automatic assessment of failure recovery in Erlang applications Proceedings of the 8th ACM SIGPLAN workshop on ERLANG, (23-32)
  255. ACM
    Midtgaard J and Jensen T (2009). Control-flow analysis of function calls and returns by abstract interpretation, ACM SIGPLAN Notices, 44:9, (287-298), Online publication date: 31-Aug-2009.
  256. ACM
    Midtgaard J and Jensen T Control-flow analysis of function calls and returns by abstract interpretation Proceedings of the 14th ACM SIGPLAN international conference on Functional programming, (287-298)
  257. ACM
    Belt J, Robby and Deng X Sireum/Topi LDP Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (355-364)
  258. James M, Shapiro A, Springer P and Zima H (2009). Adaptive Fault Tolerance for Scalable Cluster Computing in Space, International Journal of High Performance Computing Applications, 23:3, (227-241), Online publication date: 1-Aug-2009.
  259. ACM
    Moyen J (2009). Resource control graphs, ACM Transactions on Computational Logic, 10:4, (1-44), Online publication date: 1-Aug-2009.
  260. Schmidt D (2009). Abstract Interpretation From a Denotational-semantics Perspective, Electronic Notes in Theoretical Computer Science (ENTCS), 249, (19-37), Online publication date: 1-Aug-2009.
  261. ACM
    Jiang L and Su Z Automatic mining of functionally equivalent code fragments via random testing Proceedings of the eighteenth international symposium on Software testing and analysis, (81-92)
  262. ACM
    Besson F CPA beats ∞-CFA Proceedings of the 11th International Workshop on Formal Techniques for Java-like Programs, (1-6)
  263. Passerini E, Paleari R and Martignoni L How Good Are Malware Detectors at Remediating Infected Systems? Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, (21-37)
  264. Bulychev P, Kostylev E and Zakharov V Anti-unification algorithms and their applications in program analysis Proceedings of the 7th international Andrei Ershov Memorial conference on Perspectives of Systems Informatics, (413-423)
  265. Rensink A and Zambon E A Type Graph Model for Java Programs Proceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems, (237-242)
  266. Monga M, Paleari R and Passerini E A hybrid analysis framework for detecting web application vulnerabilities Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems, (25-32)
  267. Hage J and Heeren B (2009). Strategies for Solving Constraints in Type and Effect Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 236, (163-183), Online publication date: 1-Apr-2009.
  268. Gallardo M, Merino P and Sanán D (2009). Model Checking Dynamic Memory Allocation in Operating Systems, Journal of Automated Reasoning, 42:2-4, (229-264), Online publication date: 1-Apr-2009.
  269. Kühnrich M, Schwoon S, Srba J and Kiefer S Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (440-455)
  270. ACM
    Yan F and Fong P Efficient IRM enforcement of history-based access control policies Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (35-46)
  271. ACM
    Sharygina N, Tonetta S and Tsitovich A The synergy of precise and fast abstractions for program verification Proceedings of the 2009 ACM symposium on Applied Computing, (566-573)
  272. Di Pierro A, Sotin P and Wiklicky H (2008). Relational Analysis and Precision via Probabilistic Abstract Interpretation, Electronic Notes in Theoretical Computer Science (ENTCS), 220:3, (23-42), Online publication date: 1-Dec-2008.
  273. Labbé S and Gallois J (2008). Slicing communicating automata specifications: polynomial algorithms for model reduction, Formal Aspects of Computing, 20:6, (563-595), Online publication date: 1-Dec-2008.
  274. Probst C and Hansen R (2008). An extensible analysable system model, Information Security Tech. Report, 13:4, (235-246), Online publication date: 1-Nov-2008.
  275. ACM
    Liang Y, Ju L, Chakraborty S, Mitra T and Roychoudhury A Cache-aware optimization of BAN applications Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, (149-154)
  276. ACM
    Zhang Y, Amtoft T and Nielson F From generic to specific Proceedings of the 7th international conference on Generative programming and component engineering, (45-54)
  277. ACM
    Van Horn D and Mairson H (2008). Deciding kCFA is complete for EXPTIME, ACM SIGPLAN Notices, 43:9, (275-282), Online publication date: 27-Sep-2008.
  278. ACM
    Van Horn D and Mairson H Deciding kCFA is complete for EXPTIME Proceedings of the 13th ACM SIGPLAN international conference on Functional programming, (275-282)
  279. Esparza J, Kiefer S and Luttenberger M Derivation Tree Analysis for Accelerated Fixed-Point Computation Proceedings of the 12th international conference on Developments in Language Theory, (301-313)
  280. Dupont De Dinechin B Inter-block Scoreboard Scheduling in a JIT Compiler for VLIW Processors Proceedings of the 14th international Euro-Par conference on Parallel Processing, (370-381)
  281. Gesellensetter L and Glesner S Interprocedural Speculative Optimization of Memory Accesses to Global Variables Proceedings of the 14th international Euro-Par conference on Parallel Processing, (350-359)
  282. Bauer J, Nielson F, Riis Nielson H and Pilegaard H Relational Analysis of Correlation Proceedings of the 15th international symposium on Static Analysis, (32-46)
  283. Manevich R, Lev-Ami T, Sagiv M, Ramalingam G and Berdine J Heap Decomposition for Concurrent Shape Analysis Proceedings of the 15th international symposium on Static Analysis, (363-377)
  284. Midtgaard J and Jensen T A Calculational Approach to Control-Flow Analysis by Abstract Interpretation Proceedings of the 15th international symposium on Static Analysis, (347-362)
  285. Van Horn D and Mairson H Flow Analysis, Linearity, and PTIME Proceedings of the 15th international symposium on Static Analysis, (255-269)
  286. Nanz S, Nielson F and Riis Nielson H Modal Abstractions of Concurrent Behaviour Proceedings of the 15th international symposium on Static Analysis, (159-173)
  287. ACM
    Hanus M Call pattern analysis for functional logic programs Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming, (67-78)
  288. ACM
    Kettle N and King A Bit-precise reasoning with affine functions Proceedings of the Joint Workshops of the 6th International Workshop on Satisfiability Modulo Theories and 1st International Workshop on Bit-Precise Reasoning, (46-52)
  289. Esparza J, Kiefer S and Luttenberger M Newton's Method for ω-Continuous Semirings Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II, (14-26)
  290. ACM
    Malacaria P and Chen H Lagrange multipliers and maximum information leakage in different observational models Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, (135-146)
  291. ACM
    Cheney J and Dahl M Resource bound analysis for database queries Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, (67-78)
  292. De Nicola R, Gorla D, Hansen R, Nielson F, Nielson H, Probst C and Pugliese R From flow logic to static type systems for coordination languages Proceedings of the 10th international conference on Coordination models and languages, (100-116)
  293. ACM
    Otto F and Moschny T Finding synchronization defects in java programs Proceedings of the 1st international workshop on Multicore software engineering, (41-46)
  294. Yokouchi H Strictness analysis algorithms based on an inequality system for lazy types Proceedings of the 9th international conference on Functional and logic programming, (255-271)
  295. ACM
    Wilhelm R, Engblom J, Ermedahl A, Holsti N, Thesing S, Whalley D, Bernat G, Ferdinand C, Heckmann R, Mitra T, Mueller F, Puaut I, Puschner P, Staschulat J and Stenström P (2008). The worst-case execution-time problem—overview of methods and survey of tools, ACM Transactions on Embedded Computing Systems, 7:3, (1-53), Online publication date: 1-Apr-2008.
  296. Klint P, Kooiker A and Vinju J (2008). Language Parametric Module Management for IDEs, Electronic Notes in Theoretical Computer Science (ENTCS), 203:2, (3-19), Online publication date: 1-Apr-2008.
  297. Lal A, Touili T, Kidd N and Reps T Interprocedural analysis of concurrent programs under a context bound Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems, (282-298)
  298. Marron M, Hermenegildo M, Kapur D and Stefanovic D Efficient context-sensitive shape analysis with graph based heap models Proceedings of the Joint European Conferences on Theory and Practice of Software 17th international conference on Compiler construction, (245-259)
  299. Braghin C, Cortesi A and Focardi R (2008). Information flow security in Boundary Ambients, Information and Computation, 206:2-4, (460-489), Online publication date: 1-Feb-2008.
  300. ACM
    Neamtiu I, Hicks M, Foster J and Pratikakis P (2008). Contextual effects for version-consistent dynamic software updating and safe concurrent programming, ACM SIGPLAN Notices, 43:1, (37-49), Online publication date: 14-Jan-2008.
  301. ACM
    Neamtiu I, Hicks M, Foster J and Pratikakis P Contextual effects for version-consistent dynamic software updating and safe concurrent programming Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (37-49)
  302. Lohmann N, Massuthe P, Stahl C and Weinberg D (2008). Analyzing interacting WS-BPEL processes using flexible model generation, Data & Knowledge Engineering, 64:1, (38-54), Online publication date: 1-Jan-2008.
  303. Reps T, Lal A and Kidd N Program analysis using weighted pushdown systems Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science, (23-51)
  304. Reps T, Lal A and Kidd N Program Analysis Using Weighted Pushdown Systems FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, (23-51)
  305. Di Pierro A, Hankin C and Wiklicky H A systematic approach to probabilistic pointer analysis Proceedings of the 5th Asian conference on Programming languages and systems, (335-350)
  306. Di Pierro A, Hankin C and Wiklicky H A Systematic Approach to Probabilistic Pointer Analysis Programming Languages and Systems, (335-350)
  307. Nielson F, Nielson H, Bauer J, Nielsen C and Pilegaard H Relational analysis for delivery of services Proceedings of the 3rd conference on Trustworthy global computing, (73-89)
  308. Crégut P Extracting control from data Proceedings of the 3rd conference on Trustworthy global computing, (41-56)
  309. Grégoire B and Sacchini J Combining a verification condition generator for a bytecode language with static analyses Proceedings of the 3rd conference on Trustworthy global computing, (23-40)
  310. ACM
    Pearce D, Kelly P and Hankin C (2007). Efficient field-sensitive pointer analysis of C, ACM Transactions on Programming Languages and Systems, 30:1, (4-es), Online publication date: 1-Nov-2007.
  311. del Mar Gallardo M, Joubert C and Merino P (2007). On-the-Fly Data Flow Analysis Based on Verification Technology, Electronic Notes in Theoretical Computer Science (ENTCS), 190:4, (33-48), Online publication date: 1-Nov-2007.
  312. ACM
    Høst E Understanding programmer language Companion to the 22nd ACM SIGPLAN conference on Object-oriented programming systems and applications companion, (943-944)
  313. ACM
    Van Horn D and Mairson H Relating complexity and precision in control flow analysis Proceedings of the 12th ACM SIGPLAN international conference on Functional programming, (85-96)
  314. ACM
    Van Horn D and Mairson H (2007). Relating complexity and precision in control flow analysis, ACM SIGPLAN Notices, 42:9, (85-96), Online publication date: 1-Oct-2007.
  315. Noll T and Rieger S Composing transformations to optimize linear code Proceedings of the 4th international conference on Theoretical aspects of computing, (425-439)
  316. Lammich P and Müller-Olm M Precise fixpoint-based analysis of programs with thread-creation and procedures Proceedings of the 18th international conference on Concurrency Theory, (287-302)
  317. Nanz S, Nielson F and Nielson H Topology-dependent abstractions of broadcast networks Proceedings of the 18th international conference on Concurrency Theory, (226-240)
  318. ACM
    Janota M, Grigore R and Moskal M Reachability analysis for annotated code Proceedings of the 2007 conference on Specification and verification of component-based systems: 6th Joint Meeting of the European Conference on Software Engineering and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, (23-30)
  319. Sankaranarayanan S, Ivančić F and Gupta A Program analysis using symbolic ranges Proceedings of the 14th international conference on Static Analysis, (366-383)
  320. Chen K, Weng S, Wang M, Khoo S and Chen C A compilation model for aspect-oriented polymorphically typed functional languages Proceedings of the 14th international conference on Static Analysis, (34-51)
  321. Palmer R, DeLisi M, Gopalakrishnan G and Kirby R An approach to formalization and analysis of message passing libraries Proceedings of the 12th international conference on Formal methods for industrial critical systems, (164-181)
  322. Schlich B, Löll J and Kowalewski S Application of static analyses for state space reduction to microcontroller assembly code Proceedings of the 12th international conference on Formal methods for industrial critical systems, (21-37)
  323. Huima A Implementing conformiq Qtronic Proceedings of the 19th IFIP TC6/WG6.1 international conference, and 7th international conference on Testing of Software and Communicating Systems, (1-12)
  324. ACM
    Hardekopf B and Lin C The ant and the grasshopper Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (290-299)
  325. ACM
    Chen H and Malacaria P Quantitative analysis of leakage for multi-threaded programs Proceedings of the 2007 workshop on Programming languages and analysis for security, (31-40)
  326. ACM
    Nielsen J and Schwartzbach M A domain-specific programming language for secure multiparty computation Proceedings of the 2007 workshop on Programming languages and analysis for security, (21-30)
  327. ACM
    Hardekopf B and Lin C (2007). The ant and the grasshopper, ACM SIGPLAN Notices, 42:6, (290-299), Online publication date: 10-Jun-2007.
  328. Segura C and Torrano C (2007). Using Template Haskell for Abstract Interpretation, Electronic Notes in Theoretical Computer Science (ENTCS), 177, (201-217), Online publication date: 1-Jun-2007.
  329. Schmidt D (2007). Extracting Program Logics From Abstract Interpretations Defined by Logical Relations, Electronic Notes in Theoretical Computer Science (ENTCS), 173, (339-356), Online publication date: 1-Apr-2007.
  330. Nielson F and Riis Nielson H (2007). Heuristics for Safety and Security Constraints, Electronic Notes in Theoretical Computer Science (ENTCS), 172, (523-543), Online publication date: 1-Apr-2007.
  331. Bartoletti M, Degano P, Ferrari G and Zunino R Types and Effects for resource usage analysis Proceedings of the 10th international conference on Foundations of software science and computational structures, (32-47)
  332. ACM
    Benton N and Buchlovsky P Semantics of an effect analysis for exceptions Proceedings of the 2007 ACM SIGPLAN international workshop on Types in languages design and implementation, (15-26)
  333. Nielson H and Nielson F Data flow analysis for CCS Program analysis and compilation, theory and practice, (311-327)
  334. Nielson F and Nielson H Types from control flow analysis Program analysis and compilation, theory and practice, (293-310)
  335. Manevich R, Field J, Henzinger T, Ramalingam G and Sagiv M Abstract counterexample-based refinement for powerset domains Program analysis and compilation, theory and practice, (273-292)
  336. Di Pierro A, Hankin C and Wiklicky H Abstract interpretation for worst and average case analysis Program analysis and compilation, theory and practice, (160-174)
  337. ACM
    Yorsh G, Reps T, Sagiv M and Wilhelm R (2007). Logical characterizations of heap abstractions, ACM Transactions on Computational Logic, 8:1, (5-es), Online publication date: 1-Jan-2007.
  338. ACM
    Leavens G, Abrial J, Batory D, Butler M, Coglio A, Fisler K, Hehner E, Jones C, Miller D, Peyton-Jones S, Sitaraman M, Smith D and Stump A Roadmap for enhanced languages and methods to aid verification Proceedings of the 5th international conference on Generative programming and component engineering, (221-236)
  339. ACM
    Gerdt P and Sajaniemi J (2006). A web-based service for the automatic detection of roles of variables, ACM SIGCSE Bulletin, 38:3, (178-182), Online publication date: 26-Sep-2006.
  340. ACM
    Reppy J Type-sensitive control-flow analysis Proceedings of the 2006 workshop on ML, (74-83)
  341. ACM
    Ross K Towards an automatic complexity analysis for generic programs Proceedings of the 2006 ACM SIGPLAN workshop on Generic programming, (87-95)
  342. Lohmann N, Massuthe P, Stahl C and Weinberg D Analyzing interacting BPEL processes Proceedings of the 4th international conference on Business Process Management, (17-32)
  343. Amiranoff P, Cohen A and Feautrier P Beyond iteration vectors Proceedings of the 13th international conference on Static Analysis, (161-180)
  344. Kim Y and Chang B Visualization of permission checks in java using static analysis Proceedings of the 7th international conference on Information security applications: PartI, (133-146)
  345. Gopan D and Reps T Lookahead widening Proceedings of the 18th international conference on Computer Aided Verification, (452-466)
  346. ACM
    Yorsh G, Ball T and Sagiv M Testing, abstraction, theorem proving Proceedings of the 2006 international symposium on Software testing and analysis, (145-156)
  347. ACM
    Sandberg C, Ermedahl A, Gustafsson J and Lisper B (2006). Faster WCET flow analysis by program slicing, ACM SIGPLAN Notices, 41:7, (103-112), Online publication date: 12-Jul-2006.
  348. ACM
    Matsuno Y and Ohori A A type system equivalent to static single assignment Proceedings of the 8th ACM SIGPLAN international conference on Principles and practice of declarative programming, (249-260)
  349. ACM
    Gerdt P and Sajaniemi J A web-based service for the automatic detection of roles of variables Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, (178-182)
  350. ACM
    Sandberg C, Ermedahl A, Gustafsson J and Lisper B Faster WCET flow analysis by program slicing Proceedings of the 2006 ACM SIGPLAN/SIGBED conference on Language, compilers, and tool support for embedded systems, (103-112)
  351. ACM
    Jovanovic N, Kruegel C and Kirda E Precise alias analysis for static detection of web application vulnerabilities Proceedings of the 2006 workshop on Programming languages and analysis for security, (27-36)
  352. ACM
    Sreedhar V Data-centric security Proceedings of the eleventh ACM symposium on Access control models and technologies, (170-179)
  353. Nielsen C and Nielson H (2006). Static analysis for blinding, Nordic Journal of Computing, 13:1, (98-116), Online publication date: 1-Jun-2006.
  354. Brückner I, Metzler B and Wehrheim H (2006). Optimizing slicing of formal specifications by deductive verification, Nordic Journal of Computing, 13:1, (22-45), Online publication date: 1-Jun-2006.
  355. ACM
    Ji M, Wang J, Li S and Qi Z Automated WCET analysis based on program modes Proceedings of the 2006 international workshop on Automation of software test, (36-42)
  356. Simões H, Hammond K, Florido M and Vasconcelos P Using intersection types for cost-analysis of higher-order polymorphic functional programs Proceedings of the 2006 international conference on Types for proofs and programs, (221-236)
  357. Klein G and Huuck R High assurance system software Proceedings of the 10th Australian workshop on Safety critical systems and software - Volume 55, (59-67)
  358. de la Cámara P, del Mar Gallardo M and Merino P Abstract matching for software model checking Proceedings of the 13th international conference on Model Checking Software, (182-200)
  359. Lamprecht A, Margaria T and Steffen B Data-Flow analysis as model checking within the jABC Proceedings of the 15th international conference on Compiler Construction, (101-104)
  360. ACM
    Chang B (2006). Static check analysis for Java stack inspection, ACM SIGPLAN Notices, 41:3, (40-48), Online publication date: 1-Mar-2006.
  361. ACM
    Amtoft T, Bandhakavi S and Banerjee A (2006). A logic for information flow in object-oriented programs, ACM SIGPLAN Notices, 41:1, (91-102), Online publication date: 12-Jan-2006.
  362. ACM
    Hunt S and Sands D (2006). On flow-sensitive security types, ACM SIGPLAN Notices, 41:1, (79-90), Online publication date: 12-Jan-2006.
  363. ACM
    Amtoft T, Bandhakavi S and Banerjee A A logic for information flow in object-oriented programs Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (91-102)
  364. ACM
    Hunt S and Sands D On flow-sensitive security types Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (79-90)
  365. Jaffar J, Santosa A and Voicu R A CLP method for compositional and intermittent predicate abstraction Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (17-32)
  366. Sălcianu A and Arkoudas K (2005). Machine-Checkable Correctness Proofs for Intra-procedural Dataflow Analyses, Electronic Notes in Theoretical Computer Science (ENTCS), 141:2, (53-68), Online publication date: 1-Dec-2005.
  367. ACM
    Spoon S and Shivers O Dynamic data polyvariance using source-tagged classes Proceedings of the 2005 symposium on Dynamic languages, (35-48)
  368. Sistla A and Zhou M Combining static analysis and model checking for systems employing commutative functions Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (68-82)
  369. Reps T, Schwoon S, Jha S and Melski D (2005). Weighted pushdown systems and their application to interprocedural dataflow analysis, Science of Computer Programming, 58:1-2, (206-263), Online publication date: 1-Oct-2005.
  370. Field J, Goyal D, Ramalingam G and Yahav E (2005). Typestate verification, Science of Computer Programming, 58:1-2, (57-82), Online publication date: 1-Oct-2005.
  371. ACM
    Pister M and Kästner D Generic software pipelining at the assembly level Proceedings of the 2005 workshop on Software and compilers for embedded systems, (50-61)
  372. Gedell T Embedding static analysis into tableaux and sequent based frameworks Proceedings of the 14th international conference on Automated Reasoning with Analytic Tableaux and Related Methods, (108-122)
  373. Blech J, Gesellensetter L and Glesner S Formal Verification of Dead Code Elimination in Isabelle/HOL Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (200-209)
  374. Rinetzky N, Sagiv M and Yahav E Interprocedural shape analysis for cutpoint-free programs Proceedings of the 12th international conference on Static Analysis, (284-302)
  375. Tolstrup T, Nielson F and Nielson H Information flow analysis for VHDL Proceedings of the 8th international conference on Parallel Computing Technologies, (79-98)
  376. Kruegel C, Kirda E, Mutz D, Robertson W and Vigna G Automating mimicry attacks using static binary analysis Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (11-11)
  377. Karapoulios C, Adam G and Xanthakis S Software system analysis with graph homomorphisms Proceedings of the 9th WSEAS International Conference on Systems, (1-7)
  378. ACM
    d'Amorim M and Havelund K (2005). Event-based runtime verification of java programs, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  379. Nielsen C, Andersen E and Nielson H (2005). Static Validation of a Voting Protocol, Electronic Notes in Theoretical Computer Science (ENTCS), 135:1, (115-134), Online publication date: 1-Jul-2005.
  380. ACM
    d'Amorim M and Havelund K Event-based runtime verification of java programs Proceedings of the third international workshop on Dynamic analysis, (1-7)
  381. Bodei C, Buchholtz M, Degano P, Nielson F and Nielson H (2005). Static validation of security protocols, Journal of Computer Security, 13:3, (347-390), Online publication date: 1-May-2005.
  382. Glesner S (2005). A Proof Calculus for Natural Semantics Based on Greatest Fixed Point Semantics, Electronic Notes in Theoretical Computer Science (ENTCS), 132:1, (73-93), Online publication date: 1-May-2005.
  383. Martens A Analyzing web service based business processes Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (19-33)
  384. Flanagan C, Freund S and Qadeer S (2005). Exploiting Purity for Atomicity, IEEE Transactions on Software Engineering, 31:4, (275-291), Online publication date: 1-Apr-2005.
  385. Dams D and Namjoshi K Automata as abstractions Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (216-232)
  386. ACM
    Rinetzky N, Bauer J, Reps T, Sagiv M and Wilhelm R (2005). A semantics for procedure local heaps and its abstractions, ACM SIGPLAN Notices, 40:1, (296-309), Online publication date: 12-Jan-2005.
  387. ACM
    Rinetzky N, Bauer J, Reps T, Sagiv M and Wilhelm R A semantics for procedure local heaps and its abstractions Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (296-309)
  388. ACM
    Hansen S, Skriver J and Nielson H Using static analysis to validate the SAML single sign-on protocol Proceedings of the 2005 workshop on Issues in the theory of security, (27-40)
  389. Pearce D, Kelly P and Hankin C (2004). Online Cycle Detection and Difference Propagation, Software Quality Journal, 12:4, (311-337), Online publication date: 1-Dec-2004.
  390. Di Pierro A, Hankin C and Wiklicky H Probabilistic linda-based coordination languages Proceedings of the Third international conference on Formal Methods for Components and Objects, (120-140)
  391. Baldan P, Corradini A, König B and König B (2004). Verifying a Behavioural Logic for Graph Transformation Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 104, (5-24), Online publication date: 1-Nov-2004.
  392. Brylow D and Palsberg J (2004). Deadline Analysis of Interrupt-Driven Software, IEEE Transactions on Software Engineering, 30:10, (634-655), Online publication date: 1-Oct-2004.
  393. Lacey D, Jones N, Van Wyk E and Frederiksen C (2004). Compiler Optimization Correctness by Temporal Logic, Higher-Order and Symbolic Computation, 17:3, (173-206), Online publication date: 1-Sep-2004.
  394. Braghin C, Cortesi A, Focardi R, Luccio F and Piazza C (2004). Behind BANANA, Electronic Notes in Theoretical Computer Science (ENTCS), 99, (319-337), Online publication date: 1-Aug-2004.
  395. Bartoletti M, Degano P and Ferrari G (2004). Program Transformations under Dynamic Security Policies, Electronic Notes in Theoretical Computer Science (ENTCS), 99, (49-86), Online publication date: 1-Aug-2004.
  396. ACM
    Flanagan C, Freund S and Qadeer S Exploiting purity for atomicity Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (221-231)
  397. ACM
    Flanagan C, Freund S and Qadeer S (2004). Exploiting purity for atomicity, ACM SIGSOFT Software Engineering Notes, 29:4, (221-231), Online publication date: 1-Jul-2004.
  398. ACM
    Glesner S and Zimmermann W (2004). Natural semantics as a static program analysis framework, ACM Transactions on Programming Languages and Systems, 26:3, (510-577), Online publication date: 1-May-2004.
  399. ACM
    Shivers O (2004). Higher-order control-flow analysis in retrospect, ACM SIGPLAN Notices, 39:4, (257-269), Online publication date: 1-Apr-2004.
  400. Kirkegaard C, Møller A and I. Schwartzbach M (2004). Static Analysis of XML Transformations in Java, IEEE Transactions on Software Engineering, 30:3, (181-192), Online publication date: 1-Mar-2004.
  401. Levi F and Maffeis S (2004). On abstract interpretation of mobile ambients, Information and Computation, 188:2, (179-240), Online publication date: 29-Jan-2004.
  402. Müller-Olm M (2004). Precise interprocedural dependence analysis of parallel programs, Theoretical Computer Science, 311:1-3, (325-388), Online publication date: 23-Jan-2004.
  403. Rose E (2004). Lightweight Bytecode Verification, Journal of Automated Reasoning, 31:3-4, (303-334), Online publication date: 15-Jan-2004.
  404. Nielson F, Nielson H, Priami C and Rosa D Static analysis for systems biology Proceedings of the winter international synposium on Information and communication technologies, (1-6)
  405. Lu L (2003). Path Dependent Analysis of Logic Programs, Higher-Order and Symbolic Computation, 16:4, (341-377), Online publication date: 1-Dec-2003.
  406. ACM
    Christensen A, Møller A and Schwartzbach M (2003). Extending Java for high-level Web service construction, ACM Transactions on Programming Languages and Systems, 25:6, (814-875), Online publication date: 1-Nov-2003.
  407. Vasconcelos P and Hammond K Inferring cost equations for recursive, polymorphic and higher-order functional programs Proceedings of the 15th international conference on Implementation of Functional Languages, (86-101)
  408. Leroy X (2003). Java Bytecode Verification, Journal of Automated Reasoning, 30:3-4, (235-269), Online publication date: 5-Aug-2003.
  409. Field J, Goyal D, Ramalingam G and Yahav E Typestate verification Proceedings of the 10th international conference on Static analysis, (439-462)
  410. Kuncak V and Rinard M Existential heap abstraction entailment is undecidable Proceedings of the 10th international conference on Static analysis, (418-438)
  411. Thiemann P Continuation-based partial evaluation without continuations Proceedings of the 10th international conference on Static analysis, (366-382)
  412. Baldan P, König B and König B A logic for analyzing abstractions of graph transformation systems Proceedings of the 10th international conference on Static analysis, (255-272)
  413. Christensen A, Møller A and Schwartzbach M Precise analysis of string expressions Proceedings of the 10th international conference on Static analysis, (1-18)
  414. Zhou D, Pande S and Schwan K Method Partitioning - Runtime Customization of Pervasive Programs without Design-time Application Knowledge Proceedings of the 23rd International Conference on Distributed Computing Systems
  415. Nielson F, Nielson H and Seidl H (2002). A succinct solver for ALFP, Nordic Journal of Computing, 9:4, (335-372), Online publication date: 1-Dec-2002.
  416. ACM
    Bruns G and Chandra S Searching for points-to analysis Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, (61-70)
  417. ACM
    Clarke D and Drossopoulou S (2002). Ownership, encapsulation and the disjointness of type and effect, ACM SIGPLAN Notices, 37:11, (292-310), Online publication date: 17-Nov-2002.
  418. ACM
    Clarke D and Drossopoulou S Ownership, encapsulation and the disjointness of type and effect Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (292-310)
  419. ACM
    Bruns G and Chandra S (2002). Searching for points-to analysis, ACM SIGSOFT Software Engineering Notes, 27:6, (61-70), Online publication date: 1-Nov-2002.
  420. ACM
    Besson F, de Grenier de Latour T and Jensen T Secure calling contexts for stack inspection Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming, (76-87)
  421. Portillo Á, Hammond K, Loidl H and Vasconcelos P Cost analysis using automatic size and time inference Proceedings of the 14th international conference on Implementation of functional languages, (232-247)
  422. Reppy J (2002). Optimizing Nested Loops Using Local CPS Conversion, Higher-Order and Symbolic Computation, 15:2-3, (161-180), Online publication date: 1-Sep-2002.
  423. ACM
    Doh K and Shin S (2002). Detection of information leak by data flow analysis, ACM SIGPLAN Notices, 37:8, (66-71), Online publication date: 1-Aug-2002.
  424. Chang B (2002). Managing the granularity of constraint-based analyses by rule transformation, Information Processing Letters, 83:2, (79-88), Online publication date: 31-Jul-2002.
  425. Cau A, Hale R, Dimitrov J, Zedan H, Moszkowski B, Manjunathaiah M and Spivey M (2002). A Compositional Framework for Hardware/Software Co-Design, Design Automation for Embedded Systems, 6:4, (367-399), Online publication date: 1-Jul-2002.
  426. ACM
    Ramalingam G, Warshavsky A, Field J, Goyal D and Sagiv M Deriving specialized program analyses for certifying component-client conformance Proceedings of the ACM SIGPLAN 2002 conference on Programming language design and implementation, (83-94)
  427. Nielson F, Nielson H and Hansen R (2002). Validating firewalls using flow logics, Theoretical Computer Science, 283:2, (381-418), Online publication date: 14-Jun-2002.
  428. ACM
    Ramalingam G, Warshavsky A, Field J, Goyal D and Sagiv M (2002). Deriving specialized program analyses for certifying component-client conformance, ACM SIGPLAN Notices, 37:5, (83-94), Online publication date: 17-May-2002.
  429. ACM
    Igarashi A and Kobayashi N Resource usage analysis Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (331-342)
  430. ACM
    Lacey D, Jones N, Van Wyk E and Frederiksen C Proving correctness of compiler optimizations by temporal logic Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (283-294)
  431. Schmidt D Structure-preserving binary relations for program abstraction The essence of computation, (245-265)
  432. Nielson H and Nielson F Flow logic The essence of computation, (223-244)
  433. Hatcliff J, Dwyer M, Păsăreanu C and Robby Foundations of the Bandera abstraction tools The essence of computation, (172-203)
  434. Hankin C, Nagarajan R and Sampath P Flow analysis The essence of computation, (135-156)
  435. Coors M, Keding H, Lüthje O and Meyr H (2002). Design and DSP implementation of fixed-point systems, EURASIP Journal on Advances in Signal Processing, 2002:1, (908-925), Online publication date: 1-Jan-2002.
  436. ACM
    Igarashi A and Kobayashi N (2002). Resource usage analysis, ACM SIGPLAN Notices, 37:1, (331-342), Online publication date: 1-Jan-2002.
  437. ACM
    Lacey D, Jones N, Van Wyk E and Frederiksen C (2002). Proving correctness of compiler optimizations by temporal logic, ACM SIGPLAN Notices, 37:1, (283-294), Online publication date: 1-Jan-2002.
  438. ACM
    Seth A, Keskar R and Venugopal R Algorithms for energy optimization using processor instructions Proceedings of the 2001 international conference on Compilers, architecture, and synthesis for embedded systems, (195-202)
  439. ACM
    Lüthje O, Coors M, Keding H and Meyr H A novel approach to code analysis of digital signal processing systems Proceedings of the 2001 international conference on Compilers, architecture, and synthesis for embedded systems, (76-83)
  440. Malenfant B Flow Analysis to Detect Blocked Statements Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
  441. ACM
    Chitil O (2001). Compositional explanation of types and algorithmic debugging of type errors, ACM SIGPLAN Notices, 36:10, (193-204), Online publication date: 1-Oct-2001.
  442. ACM
    Chitil O Compositional explanation of types and algorithmic debugging of type errors Proceedings of the sixth ACM SIGPLAN international conference on Functional programming, (193-204)
  443. Ferrari G, Moggi E and Pugliese R MetaKlaim Proceedings of the 2nd international conference on Semantics, applications, and implementation of program generation, (183-198)
  444. ACM
    Turbak F and Wells J Cycle therapy Proceedings of the 3rd ACM SIGPLAN international conference on Principles and practice of declarative programming, (137-149)
  445. ACM
    Chang B and Jo J Granularity of constraint-based analysis for Java Proceedings of the 3rd ACM SIGPLAN international conference on Principles and practice of declarative programming, (94-102)
  446. Dwyer M, Hatcliff J, Joehanes R, Laubach S, Păsăreanu C, Zheng H and Visser W Tool-supported program abstraction for finite-state verification Proceedings of the 23rd International Conference on Software Engineering, (177-187)
  447. ACM
    Salcianu A and Rinard M (2001). Pointer and escape analysis for multithreaded programs, ACM SIGPLAN Notices, 36:7, (12-23), Online publication date: 1-Jul-2001.
  448. ACM
    Salcianu A and Rinard M Pointer and escape analysis for multithreaded programs Proceedings of the eighth ACM SIGPLAN symposium on Principles and practices of parallel programming, (12-23)
  449. ACM
    Palsberg J Type-based analysis and applications Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (20-27)
  450. ACM
    Rehof J and Fähndrich M (2001). Type-base flow analysis, ACM SIGPLAN Notices, 36:3, (54-66), Online publication date: 1-Mar-2001.
  451. ACM
    Rehof J and Fähndrich M Type-base flow analysis Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (54-66)
  452. Barthe G and Serpette B Static reduction analysis for imperative object oriented languages Proceedings of the 7th international conference on Logic for programming and automated reasoning, (344-361)
  453. ACM
    Damian D and Danvy O (2000). Syntactic accidents in program analysis, ACM SIGPLAN Notices, 35:9, (209-220), Online publication date: 1-Sep-2000.
  454. ACM
    Hanus M and Steiner F Type-based nondeterminism checking in functional logic programs Proceedings of the 2nd ACM SIGPLAN international conference on Principles and practice of declarative programming, (202-213)
  455. ACM
    Damian D and Danvy O Syntactic accidents in program analysis Proceedings of the fifth ACM SIGPLAN international conference on Functional programming, (209-220)
  456. ACM
    Rugina R and Rinard M Symbolic bounds analysis of pointers, array indices, and accessed memory regions Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation, (182-195)
  457. ACM
    Rugina R and Rinard M (2000). Symbolic bounds analysis of pointers, array indices, and accessed memory regions, ACM SIGPLAN Notices, 35:5, (182-195), Online publication date: 1-May-2000.
  458. Theiling H, Ferdinand C and Wilhelm R (2000). Fast and Precise WCET Prediction by Separated Cache andPath Analyses, Real-Time Systems, 18:2/3, (157-179), Online publication date: 1-May-2000.
  459. Schmidt D (2000). Induction, Domains, Calculi, Higher-Order and Symbolic Computation, 13:1-2, (89-101), Online publication date: 1-Apr-2000.
  460. ACM
    Sandholm A and Schwartzbach M A type system for dynamic Web documents Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (290-301)
  461. ACM
    Nielson H and Nielson F Shape analysis for mobile ambients Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (142-154)
  462. Braune B and Wilhelm R (2000). Focusing in Algorithm Explanation, IEEE Transactions on Visualization and Computer Graphics, 6:1, (1-7), Online publication date: 1-Jan-2000.
  463. Nielson F and Nielson H Type and Effect Systems Correct System Design, Recent Insight and Advances, (to Hans Langmaack on the occasion of his retirement from his professorship at the University of Kiel), (114-136)
Contributors
  • Technical University of Denmark
  • Technical University of Denmark
  • Imperial College London

Recommendations

George Hacken

According to the back cover of this book, it is "aimed at M.Sc. and Ph.D. students but will be valuable also for experienced researchers and professionals." Though it is true for any book that a reader or reviewer should keep the book's intended audience in mind, this is most emphatically the case with this book. This statement should not be taken in a negative way, as this book is an excellent, recommended work. The authors' goals, as stated in their preface, are, first, to provide an advanced textbook for their own courses in program analysis, so as to mitigate the necessity to gather "conference papers supplemented with the occasional journal paper or chapter from a text book out of print," and, second, to "increase the awareness in the field about the many similarities between the various approaches [to program analysis]." The program analysis that the authors address encompasses "static compile-time techniques for predicting safe and computable approximations to the set of values or behaviours arising at run-time." The four major types of program analysis that the book addresses are: data flow (chapter 2); constraint-based (chapter 3); abstract interpretation (chapter 4); and type and effect (chapter 5). Chapter 6 covers program analysis algorithms. I repeat here for completeness the authors' statement that the book omits denotationally based program analysis, projection analysis, Stone dualities, and other topics "dear to the heart of the authors." The book is made up of six well-written and tightly-woven chapters, and three appendices: "Partially Ordered Sets," which supplies the reader with prerequisite notions of posets and lattices, including Tarski's fixed-point theorem; "Induction and Coinduction,"; and "Graphs and Regular Expressions." The book is excellently organized. Chapter 1 is a faithful preview of chapters 2 through 5, and contains very thorough and well-done "navigation aids" (including the table of contents, lists of tables and figures, and an index). The writing is clear and to the point, and there are very few typographical errors. The mathematical style is economical and austere, as is proper for the book's advanced level and implicit prerequisites. That "the book is relatively self-contained, although the reader will benefit from previous exposure to discrete mathematics and compilers" is accurately stated in the preface, as long as "previous exposure" is not read as "nodding acquaintance." The authors have tested the book at various times, levels, and places, and it has evolved accordingly. Chapter 1, which "is intended to be read quickly," promises, and delivers, "an overview of the main approaches to program analysis." This first chapter gives concrete examples of the major abstractions that are addressed in the book, using the authors' small sequence selection iteration language, WHILE, to illustrate analyses of imperative languages, and basing other examples on functional language constructs that are subsequently captured in the authors' small FUNctional language. (The book does not discuss the analysis of logic programs.) Chapter 1 succeeds both in differentiating the four major analyses at a high level, and in showing their common points or unifying themes. The authors' encouragement to read chapter 1 rapidly is well taken, as both notations and notions become clearer in the detailed chapters that follow. I recommend, moreover, in an admittedly easier-said-than-done spirit, that readers first perform a quick reading of the entire book, while paying particular attention to each chapter's "Concluding Remarks" (which summarize the chapter's motivation and enhance intuition, often via apposite real-life, noncomputing analogies). It is clear that this work is written by experts, for professionals and advanced students, and that it is based on a broad and deep study of the program analysis literature, including the authors' own contributions. The authors are, moreover, quite meticulous in giving credit where it is due, while keeping the list of references complete but focused. I recommend this book highly to the serious student, instructor, or program analysis specialist, and also to the professional nonspecialist; the latter's thinking will certainly be jogged with very useful ideas and techniques. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.