Finding application errors and security flaws using PQL
Top Cited Papers
- 12 October 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 40 (10), 365-383
- https://doi.org/10.1145/1094811.1094840
Abstract
No abstract availableKeywords
This publication has 30 references indexed in Scilit:
- Relational queries over program tracesPublished by Association for Computing Machinery (ACM) ,2005
- DynaMinePublished by Association for Computing Machinery (ACM) ,2005
- Synthesis of interface specifications for Java classesPublished by Association for Computing Machinery (ACM) ,2005
- Automatically Hardening Web Applications Using Precise TaintingPublished by Springer Nature ,2005
- Mining Temporal Specifications for Error DetectionLecture Notes in Computer Science, 2005
- Securing web application code by static analysis and runtime protectionPublished by Association for Computing Machinery (ACM) ,2004
- A practical flow-sensitive and context-sensitive C and C++ memory leak detectorPublished by Association for Computing Machinery (ACM) ,2003
- A Type System and Analysis for the Automatic Extraction and Enforcement of Design InformationLecture Notes in Computer Science, 2003
- EraserACM Transactions on Computer Systems, 1997
- The model checker SPINIEEE Transactions on Software Engineering, 1997