T-CREST: Time-predictable multi-core architecture for embedded systems M Schoeberl, S Abbaspour, B Akesson, N Audsley, R Capasso, J Garside, ... Journal of Systems Architecture 61 (9), 449-471, 2015 | 253 | 2015 |
Combining string abstract domains for JavaScript analysis: An evaluation R Amadini, A Jordan, G Gange, F Gauthier, P Schachte, H Søndergaard, ... Tools and Algorithms for the Construction and Analysis of Systems: 23rd …, 2017 | 38 | 2017 |
A FFOGATO: runtime detection of injection attacks for Node. js F Gauthier, B Hassanshahi, A Jordan Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 94-99, 2018 | 32 | 2018 |
Static analysis of worst-case stack cache behavior A Jordan, F Brandner, M Schoeberl Proceedings of the 21st International conference on Real-Time Networks and …, 2013 | 27 | 2013 |
Static profiling of the worst-case in real-time programs F Brandner, S Hepp, A Jordan Proceedings of the 20th International Conference on Real-Time and Network …, 2012 | 18 | 2012 |
Reference Abstract Domains and Applications to String Analysis R Amadini, G Gange, F Gauthier, A Jordan, P Schachte, H Søndergaard, ... Fundamenta Informaticae 158 (4), 297-326, 2018 | 13 | 2018 |
Lazy spilling for a time-predictable stack cache: Implementation and analysis S Abbaspour, A Jordan, F Brandner 14th International Workshop on Worst-Case Execution Time Analysis, 83-92, 2014 | 13 | 2014 |
IR-level versus machine-level if-conversion for predicated architectures A Jordan, N Kim, A Krall Proceedings of the 10th Workshop on Optimizations for DSP and Embedded …, 2013 | 13 | 2013 |
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation A Jordan, F Gauthier, B Hassanshahi, D Zhao arXiv preprint arXiv:1810.12490, 2018 | 10 | 2018 |
Criticality: static profiling for real-time programs F Brandner, S Hepp, A Jordan Real-Time Systems 50, 377-410, 2014 | 10 | 2014 |
Automatic Modeling of Opaque Code for JavaScript Static Analysis J Park, A Jordan, S Ryu International Conference on Fundamental Approaches to Software Engineering …, 2019 | 9 | 2019 |
Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation A Jordan, F Gauthier, B Hassanshahi, D Zhao Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019 | 5 | 2019 |
Taint analysis with access paths N Allen, F Gauthier, A Jordan US Patent 10,789,362, 2020 | 4 | 2020 |
Trade-offs in managing risk and technical debt in industrial research labs: an experience report F Gauthier, A Jordan, P Krishnan, B Hassanshahi, JG Süß, S Bae, H Lee Proceedings of the 3rd International Conference on Technical Debt, 98-102, 2020 | 4 | 2020 |
Detecting malicious code embedded in documents AW Jordan, F Gauthier US Patent 10,657,252, 2020 | 4 | 2020 |
Refinement of worst-case execution time bounds by graph pruning F Brandner, A Jordan Computer Languages, Systems & Structures 40 (3-4), 155-170, 2014 | 3 | 2014 |
Evaluating and estimating the WCET criticality metric A Jordan Proceedings of the 11th Workshop on Optimizations for DSP and Embedded …, 2014 | 3 | 2014 |
IFDS Taint Analysis with Access Paths N Allen, F Gauthier, A Jordan arXiv preprint arXiv:2103.16240, 2021 | 2 | 2021 |
Dynamic modeling for opaque code during static analysis A Jordan, J Park US Patent 10,620,946, 2020 | 2 | 2020 |
Subgraph-Based Refinement of Worst-Case Execution Time Bounds F Brandner, A Jordan Tech. Rep. hal-00978015 (version 1), ENSTA, 2014 | 2 | 2014 |