Pointer analysis

Results: 174



#Item
71Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
72Data types / Primitive types / Hypothesis testing / Pointer / Null / Binary search tree / C / Statistical hypothesis testing / P-value / Computing / Software engineering / Computer programming

Evaluating and Tuning a Static Analysis to Find Null ∗ Pointer Bugs David Hovemeyer, Jaime Spacco, and William Pugh Dept. of Computer Science University of Maryland

Add to Reading List

Source URL: faculty.ycp.edu

Language: English - Date: 2014-08-22 12:24:22
73Mathematics / Reachability / Separable space / FO / Live variable analysis / Applied mathematics / Theoretical computer science / Data-flow analysis / Pointer

On the K-reachability Problem for Data Flow Analysis Reasoning may/must queries for combinatorial definitions Xiao Xiao, Charles Zhang Department of Computer Science and Engineering Hong Kong University of Science and Te

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2013-12-20 23:04:53
74Software / X86 assembly language / Pin / X86 / Assembly language / Interpreter / Pointer / Binary code / Portable Executable / Computing / Programming language implementation / Software engineering

BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-07-11 06:21:50
75Cross-platform software / Java / Null / Pointer / Bytecode / C / Parameter / Assertion / Computing / Software engineering / Computer programming

Nullness Analysis of Java Bytecode via Supercompilation over Abstract Values? Ilya G. Klyuchnikov JetBrains; Keldysh Institute of Applied Mathematics of RAS Abstract. Code inspections in the upcoming release of IntelliJ

Add to Reading List

Source URL: meta2014.pereslavl.ru

Language: English - Date: 2014-06-15 20:00:00
76Dataflow / Symbolic execution / Algorithm / Information flow / Dependence analysis / Pointer / Information / Taint checking / Computing / Software engineering / Parallel computing

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
77Information / Internet standards / Data transmission / Petroleum production / Separator / Communications protocol / Transmission Control Protocol / Password authentication protocol / Pointer / Computing / Data / Internet protocols

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis ∗ Juan Caballero∗ , Heng Yin†∗ , Zhenkai Liang∗ , Dawn Song‡∗ Carnegie Mellon University † College of William and Ma

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
78Cross-platform software / Software bugs / FindBugs / William Pugh / Debugging / Pointer / Java / Infinite loop / Computing / Computer programming / Software engineering

Improving Your Software Using Static Analysis to Find Bugs Brian Cole Reuven Lazarus David Hovemeyer ∗ Kristin Stephens

Add to Reading List

Source URL: faculty.ycp.edu

Language: English - Date: 2014-08-22 12:24:22
79Software / X86 assembly language / Pin / X86 / Assembly language / Interpreter / Pointer / Binary code / Portable Executable / Computing / Programming language implementation / Software engineering

BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
80Data types / Garbage collection / Pointer / CPU cache / Subroutine / Database / Debugging / Profiling / Forth / Computing / Software engineering / Computer programming

Tracking Data Structures for Postmortem Analysis (NIER Track) Xiao Xiao, Jinguo Zhou, Charles Zhang Department of Computer Science and Engineering Hong Kong University of Science and Technology

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2013-09-22 04:01:34
UPDATE