Sciweavers

4722 search results - page 133 / 945
» Representation-independent program analysis
Sort
View
IEEESP
2011
13 years 19 days ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
LR
2011
107views more  LR 2011»
13 years 1 days ago
Modeling and stability analysis of autonomously controlled production networks
Abstract We present methods and tools for modeling autonomously controlled production networks and investigation of their stability properties. Production networks are described as...
Sergey Dashkovskiy, Michael Görges, Michael K...
SAC
2009
ACM
14 years 4 months ago
Points-to analysis for JavaScript
JavaScript is widely used by web developers and the complexity of JavaScript programs has increased over the last year. Therefore, the need for program analysis for JavaScript is ...
Dongseok Jang, Kwang-Moo Choe
ICFP
2007
ACM
14 years 9 months ago
A generic usage analysis with subeffect qualifiers
Sharing analysis and uniqueness typing are static analyses that aim at determining which of a program's objects are to be used at most once. There are many commonalities betw...
Jurriaan Hage, Stefan Holdermans, Arie Middelkoop
POPL
2006
ACM
14 years 9 months ago
Modular set-based analysis from contracts
In PLT Scheme, programs consist of modules with contracts. The latter describe the inputs and outputs of functions and objects via predicates. A run-time system enforces these pre...
Philippe Meunier, Robert Bruce Findler, Matthias F...