Author:
Amighi Afshin,Gomes Pedro de Carvalho,Gurov Dilian,Huisman Marieke
Publisher
Springer Science and Business Media LLC
Subject
Information Systems,Software
Reference41 articles.
1. Allen, F.E.: Control flow analysis. SIGPLAN Not. 5, 1–19 (1970). doi: 10.1145/390013.808479
2. Amighi, A.: Flow graph extraction for modular verification of java programs. Master’s thesis, KTH Royal Institute of Technology, Stockholm, Sweden (2011). http://www.nada.kth.se/utbildning/grukth/exjobb/rapportlistor/2011/rapporter11/amighi_afshin_11038.pdf . Ref.: TRITA-CSC-E 2011:038
3. Amighi, A., Gomes, PdC, Gurov, D., Huisman, M.: Sound control-flow graph extraction for Java programs with exceptions. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) Software Engineering and Formal Methods, Lecture Notes in Computer Science, vol. 7504, pp. 33–47. Springer, Berlin (2012). doi: 10.1007/978-3-642-33826-7_3
4. Armando, A., Costa, G., Merlo, A., Verderame, L.: Enabling byod through secure meta-market. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & #38; Mobile Networks, WiSec ’14, pp. 219–230. ACM, New York (2014). doi: 10.1145/2627393.2627410 . http://doi.acm.org/
5. Bacon, D.F., Sweeney, P.F.: Fast static analysis of C++ virtual function calls. In: OOPSLA, pp. 324–341 (1996)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Precise Framework for Source-Level Control-Flow Analysis;2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM);2021-09
2. Algorithmic verification of procedural programs in the presence of code variability;Science of Computer Programming;2016-10
3. From Safety Critical Java Programs to Timed Process Models;Programming Languages with Applications to Biology and Security;2015