1 |
Jeffrey S. Foster, Robert Johnsson, John Kodumal, and Alex Aiken, Flow-Insensitive Type Qualifiers, ACM Transactions on Programming Languages and Systems (TOPLAS), vol.28, no.6, 1035-1087, November 2006.
DOI
ScienceOn
|
2 |
David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken, A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities, Networking and Distributed System Security Symposium (NDSS), San Diego, California, February 2000.
|
3 |
B. Steensgaard. Points-to analysis in alomost linear time, In Proceedings of the 23rd Annual ACM Symposium on Principles of Programming Languages, pp.32-41, 1996.
|
4 |
M. Berndl, O. Lhotak, F. Qian, L. Hendren and N. Umanee, Points-to Analysis using BDDs, PLDI 2003, June 2003.
|
5 |
Working Draft, Standard for Programming Language C++, http://www.openstd.org/jtc1/sc22/ wg21/, p.233.
|
6 |
A. I. SOTIROV, Automatic vulnerability detection using static source code analysis; Final thesis Department of Computer Science in the Graduate School of University of Alabama, April 2007.
|
7 |
Jeffrey S. Foster, M.Fahndrich, and A.Aiken, Flow-Insensitive Points-to Analysis with Term and Set Constraints, Technical Report UCB CSD- 97-964, U. of California, Berkeley, August 1997.
|