Author:
Hoder Kryštof,Bjørner Nikolaj,de Moura Leonardo
Publisher
Springer Berlin Heidelberg
Reference5 articles.
1. Bancilhon, F., Maier, D., Sagiv, Y., Ullman, J.D.: Magic sets and other strange ways to implement logic programs. In: PODS, pp. 1–15. ACM, New York (1986)
2. Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL, pp. 238–252 (1977)
3. Lecture Notes in Computer Science;L. Moura de,2008
4. Guarnieri, S., Livshits, V.B.: Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code. In: USENIX, pp. 151–168 (2009)
5. Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: PLDI, pp. 131–144 (2004)
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Inductive Approach to Spacer;Proceedings of the ACM on Programming Languages;2024-06-20
2. Adaptive Recursive Query Optimization;2024 IEEE 40th International Conference on Data Engineering (ICDE);2024-05-13
3. Flan: An Expressive and Efficient Datalog Compiler for Program Analysis;Proceedings of the ACM on Programming Languages;2024-01-05
4. Dependency-Aware Metamorphic Testing of Datalog Engines;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
5. WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms;2023 IEEE Symposium on Security and Privacy (SP);2023-05