Static analysis of string manipulations in critical embedded C programs, Static Analysis, 13th International Symposium, vol.4134, pp.35-51, 2006. ,
Recency-abstraction for heap-allocated storage, Static Analysis, 13th International Symposium, vol.4134, pp.221-239, 2006. ,
DOI : 10.1007/11823230_15
URL : http://www.cs.wisc.edu/wpis/papers/sas06-recency.pdf
Smallfoot: Modular automatic assertion checking with separation logic, Formal Methods for Components and Objects, 4th International Symposium, vol.4111, pp.115-137, 2005. ,
DOI : 10.1007/11804192_6
Abstract interpretation by dynamic partitioning, J. Funct. Program, vol.2, issue.4, pp.407-423, 1992. ,
DOI : 10.1017/s0956796800000496
Moving fast with software verification, NASA Formal Methods-7th International Symposium, NFM 2015, vol.9058, pp.3-11, 2015. ,
Static determination of dynamic properties of programs, Proceedings of the Second International Symposium on Programming, pp.106-130, 1976. ,
Static determination of dynamic properties of recursive procedures, IFIP Conf. on Formal Description of Programming Concepts, pp.237-277, 1977. ,
Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, Lecture Notes in Computer Science, vol.2772, pp.243-268, 2003. ,
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints, Conference Record of the Fourth ACM Symposium on Principles of Programming Languages, pp.238-252, 1977. ,
Static determination of dynamic properties of generalized type unions, Language Design for Reliable Software, pp.77-94, 1977. ,
Modular static program analysis, Compiler Construction, 11th International Conference, CC 2002, Held as Part of the Joint European Conferences on Theory and Practice of Software, vol.2304, pp.159-178, 2002. ,
DOI : 10.1007/3-540-45937-5_13
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-45937-5_13.pdf
Combination of abstractions in the astrée static analyzer, Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, vol.4435, pp.272-300, 2006. ,
A parametric segmentation functor for fully automatic and scalable array content analysis, Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.105-118, 2011. ,
DOI : 10.1145/1926385.1926399
URL : https://hal.archives-ouvertes.fr/inria-00543874
Precondition inference from intermittent assertions and application to contracts on collections, Verification, Model Checking, and Abstract Interpretation-12th International Conference, vol.6538, pp.150-168, 2011. ,
DOI : 10.1007/978-3-642-18275-4_12
URL : https://hal.archives-ouvertes.fr/inria-00543881
Automatic discovery of linear restraints among variables of a program, Conference Record of the Fifth Annual ACM Symposium on Principles of Programming Languages, pp.84-96, 1978. ,
Cleanness checking of string manipulations in C programs via integer analysis, Static Analysis, 8th International Symposium, vol.2126, pp.194-212, 2001. ,
Static contract checking with abstract interpretation, Formal Verification of Object-Oriented Software-International Conference, vol.6528, pp.10-30, 2010. ,
Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics, Proceedings of the 2006 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'06), pp.54-63, 2006. ,
Analysis of modular arithmetic, ACM Trans. Program. Lang. Syst, vol.29, issue.5, p.29, 2007. ,
A new abstraction framework for affine transformers, Static Analysis-24th International Symposium, vol.10422, pp.342-363, 2017. ,
DOI : 10.1007/978-3-319-66706-5_17
URL : https://minds.wisconsin.edu/bitstream/1793/76483/4/TR1846r1.pdf
Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities, 2008. ,
Analyzing string buffers in, Algebraic Methodology and Software Technology, 9th International Conference, vol.2422, pp.365-379, 2002. ,
Precise interprocedural analysis in the presence of pointers to the stack, Held as Part of the Joint European Conferences on Theory and Practice of Software, vol.6602, pp.459-479, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00547888
A first step towards automated detection of buffer overrun vulnerabilities, Proceedings of the Network and Distributed System Security Symposium, 2000. ,
A comparison of publicly available tools for dynamic buffer overflow prevention, Proceedings of the Network and Distributed System Security Symposium, 2003. ,