KZ Chen, NM Johnson, V D'Silva, S Dai, K MacNamara… - Ndss, 2013 - lilicoding.github.io
The difference between a malicious and a benign Android application can often be characterised by context and sequence in which certain permissions and APIs are used. We …
P Cousot, R Cousot, F Logozzo - ACM SIGPLAN Notices, 2011 - dl.acm.org
We introduce FunArray, a parametric segmentation abstract domain functor for the fully automatic and scalable analysis of array content properties. The functor enables a natural …
J Tschannen, CA Furia, M Nordio… - … 2015, Held as Part of the …, 2015 - Springer
Auto-active verifiers provide a level of automation intermediate between fully automatic and interactive: users supply code with annotations as input while benefiting from a high level of …
Expressing class specifications via executable constraints is important for various software engineering tasks such as test generation, bug finding and automated debugging, but …
T Horvath, K Skadron - Proceedings of the 17th international conference …, 2008 - dl.acm.org
This paper presents an energy management policy for reconfigurable clusters running a multi-tier application, exploiting DVS together with multiple sleep states. We develop a …
Formal specification and verification techniques have been used successfully to detect feature interactions. We investigate whether feature-based specifications can be used for …
Informal natural language that describes code functionality, such as code comments or function documentation, may contain substantial information about a programs intent …
D King, B Hicks, M Hicks, T Jaeger - Information Systems Security: 4th …, 2008 - Springer
Verifying that programs trusted to enforce security actually do so is a practical concern for programmers and administrators. However, there is a disconnect between the kinds of tools …
Functions are essential building blocks of information retrieval and information management. However, efforts implementing these functions are fragmented: one function …