Sciweavers

494 search results - page 30 / 99
» Static Analysis for Guarded Code
Sort
View
ICSE
2009
IEEE-ACM
14 years 9 months ago
The road not taken: Estimating path execution frequency statically
A variety of compilers, static analyses, and testing frameworks rely heavily on path frequency information. Uses for such information range from optimizing transformations to bug ...
Raymond P. L. Buse, Westley Weimer
ICSE
2007
IEEE-ACM
14 years 8 months ago
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
CADE
2008
Springer
14 years 9 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
ICSM
2005
IEEE
14 years 2 months ago
Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis
Many of the approaches that analyze software evolution consider a static perspective of a system. Static analysis approaches focus on the evolution of static software entities suc...
Orla Greevy, Stéphane Ducasse, Tudor G&icir...
ENTCS
2006
127views more  ENTCS 2006»
13 years 8 months ago
Component Identification Through Program Slicing
This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic c...
Nuno F. Rodrigues, Luís Soares Barbosa