Jeffrey S. Foster
Jeffrey S. Foster
Computer Science, Tufts University
Потвърден имейл адрес: tufts.edu - Начална страница
A first step towards automated detection of buffer overrun vulnerabilities.
DA Wagner, JS Foster, EA Brewer, A Aiken
NDSS 20 (0), 0, 2000
Detecting format string vulnerabilities with type qualifiers
U Shankar, K Talwar, JS Foster, D Wagner
10th USENIX Security Symposium (USENIX Security 01), 2001
Flow-sensitive type qualifiers
JS Foster, T Terauchi, A Aiken
Proceedings of the ACM SIGPLAN 2002 Conference on Programming language …, 2002
Scandroid: Automated security certification of android applications
AP Fuchs, A Chaudhuri, JS Foster
Manuscript, Univ. of Maryland, http://www. cs. umd. edu/avik/projects …, 2009
A comparison of bug finding tools for java
N Rutar, CB Almazan, JS Foster
15th International symposium on software reliability engineering, 245-256, 2004
A theory of type qualifiers
JS Foster, M Fähndrich, A Aiken
ACM SIGPLAN Notices 34 (5), 192-203, 1999
Dr. Android and Mr. Hide: fine-grained permissions in android applications
J Jeon, KK Micinski, JA Vaughan, A Fogel, N Reddy, JS Foster, T Millstein
Proceedings of the second ACM workshop on Security and privacy in …, 2012
From program verification to program synthesis
S Srivastava, S Gulwani, JS Foster
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010
Understanding source code evolution using abstract syntax tree matching
I Neamtiu, JS Foster, M Hicks
Proceedings of the 2005 international workshop on Mining software …, 2005
Locksmith: context-sensitive correlation analysis for race detection
P Pratikakis, JS Foster, M Hicks
Acm Sigplan Notices 41 (6), 320-331, 2006
Directed symbolic execution
KK Ma, K Yit Phang, JS Foster, M Hicks
Static Analysis: 18th International Symposium, SAS 2011, Venice, Italy …, 2011
Partial online cycle elimination in inclusion constraint graphs
M Fähndrich, JS Foster, Z Su, A Aiken
Proceedings of the ACM SIGPLAN 1998 conference on Programming language …, 1998
Static type inference for Ruby
M Furr, J An, JS Foster, M Hicks
Proceedings of the 2009 ACM symposium on Applied Computing, 1859-1866, 2009
Using symbolic evaluation to understand behavior in configurable software systems
E Reisner, C Song, KK Ma, JS Foster, A Porter
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
LOCKSMITH: Practical static race detection for C
P Pratikakis, JS Foster, M Hicks
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (1), 1-55, 2011
Kitsune: Efficient, general-purpose dynamic software updating for C
CM Hayden, EK Smith, M Denchev, M Hicks, JS Foster
Proceedings of the ACM international conference on Object oriented …, 2012
Polymorphic versus monomorphic flow-insensitive points-to analysis for C
JS Foster, M Fähndrich, A Aiken
International Static Analysis Symposium, 175-198, 2000
Checking type safety of foreign function calls
M Furr, JS Foster
ACM SIGPLAN Notices 40 (6), 62-72, 2005
Contextual effects for version-consistent dynamic software updating and safe concurrent programming
I Neamtiu, M Hicks, JS Foster, P Pratikakis
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2008
Template-based program verification and program synthesis
S Srivastava, S Gulwani, JS Foster
International Journal on Software Tools for Technology Transfer 15, 497-518, 2013
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20