A first step towards automated detection of buffer overrun vulnerabilities. DA Wagner, JS Foster, EA Brewer, A Aiken NDSS 20 (0), 0, 2000 | 1089 | 2000 |
Detecting format string vulnerabilities with type qualifiers U Shankar, K Talwar, JS Foster, D Wagner 10th USENIX Security Symposium (USENIX Security 01), 2001 | 636 | 2001 |
Scandroid: Automated security certification of android applications AP Fuchs, A Chaudhuri, JS Foster Manuscript, Univ. of Maryland, http://www. cs. umd. edu/avik/projects …, 2009 | 528 | 2009 |
Flow-sensitive type qualifiers JS Foster, T Terauchi, A Aiken Proceedings of the ACM SIGPLAN 2002 Conference on Programming language …, 2002 | 471 | 2002 |
A comparison of bug finding tools for java N Rutar, CB Almazan, JS Foster 15th International symposium on software reliability engineering, 245-256, 2004 | 434 | 2004 |
A theory of type qualifiers JS Foster, M Fähndrich, A Aiken ACM Sigplan Notices 34 (5), 192-203, 1999 | 416 | 1999 |
Dr. Android and Mr. Hide: fine-grained permissions in android applications J Jeon, KK Micinski, JA Vaughan, A Fogel, N Reddy, JS Foster, T Millstein Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 404* | 2012 |
Understanding source code evolution using abstract syntax tree matching I Neamtiu, JS Foster, M Hicks Proceedings of the 2005 international workshop on Mining software …, 2005 | 379 | 2005 |
From program verification to program synthesis S Srivastava, S Gulwani, JS Foster Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010 | 378 | 2010 |
Locksmith: context-sensitive correlation analysis for race detection P Pratikakis, JS Foster, M Hicks Acm Sigplan Notices 41 (6), 320-331, 2006 | 324 | 2006 |
Directed symbolic execution KK Ma, K Yit Phang, JS Foster, M Hicks Static Analysis: 18th International Symposium, SAS 2011, Venice, Italy …, 2011 | 309 | 2011 |
Partial online cycle elimination in inclusion constraint graphs M Fähndrich, JS Foster, Z Su, A Aiken Proceedings of the ACM SIGPLAN 1998 conference on Programming language …, 1998 | 281 | 1998 |
Static type inference for Ruby M Furr, J An, JS Foster, M Hicks Proceedings of the 2009 ACM symposium on Applied Computing, 1859-1866, 2009 | 228 | 2009 |
Using symbolic evaluation to understand behavior in configurable software systems E Reisner, C Song, KK Ma, JS Foster, A Porter Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010 | 144 | 2010 |
LOCKSMITH: Practical static race detection for C P Pratikakis, JS Foster, M Hicks ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (1), 1-55, 2011 | 139 | 2011 |
Kitsune: Efficient, general-purpose dynamic software updating for C CM Hayden, EK Smith, M Denchev, M Hicks, JS Foster Proceedings of the ACM international conference on Object oriented …, 2012 | 135 | 2012 |
Template-based program verification and program synthesis S Srivastava, S Gulwani, JS Foster International Journal on Software Tools for Technology Transfer 15, 497-518, 2013 | 127 | 2013 |
Polymorphic versus monomorphic flow-insensitive points-to analysis for C JS Foster, M Fähndrich, A Aiken International Static Analysis Symposium, 175-198, 2000 | 126 | 2000 |
Checking type safety of foreign function calls M Furr, JS Foster ACM SIGPLAN Notices 40 (6), 62-72, 2005 | 119 | 2005 |
Contextual effects for version-consistent dynamic software updating and safe concurrent programming I Neamtiu, M Hicks, JS Foster, P Pratikakis Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2008 | 118 | 2008 |