Barrier matching for programs with textually unaligned barriers, PPoPP, pp.194-204, 2007. ,
Replicated synchronization for imperative bsp programs, International Conference on Computational Science, vol.108, pp.12-14, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01494832
Barrier inference, Proc. ACM SIGPLAN-SIGACT Symp. on Principles of Prog. Lang. POPL, ACM, pp.342-354, 1998. ,
PARCOACH: combining static and dynamic validation of MPI collective communications, IJHPCA, vol.28, issue.4, pp.425-434, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01078762
PARCOACH Extension for a Full-Interprocedural Collectives Verification, Second International Workshop on Software Correctness for HPC Applications, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01937316
User-input dependence analysis via graph reachability, 2008. ,
, SVF: Interprocedural Static Value-flow Analysis in LLVM. CC, pp.265-266, 2016.
Flow-sensitive Pointer Analysis for Millions of Lines of Code, CGO, pp.289-298, 2011. ,
Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis, IEEE Trans. Softw. Eng, vol.40, issue.2, pp.107-122, 2014. ,
FlowDroid: Precise Context, Flow, Field, Objectsensitive and Lifecycle-aware Taint Analysis for Android Apps, SIGPLAN Not, vol.49, issue.6, pp.259-269, 2014. ,
TAJ: Effective Taint Analysis of Web Applications, PLDI, pp.87-97, 2009. ,
Detecting Format String Vulnerabilities with Type Qualifiers, 2001. ,
Certification of Programs for Secure Information Flow, Commun. ACM, vol.20, issue.7, pp.504-513, 1977. ,
The SLam Calculus: Programming with Secrecy and Integrity, POPL, pp.365-377, 1998. ,
, Panorama: Capturing Systemwide Information Flow for Malware Detection and Analysis. CCS, pp.116-127, 2007.
Language-based Information-flow Security, IEEE J.Sel. A. Commun, vol.21, issue.1, pp.5-19, 2006. ,
Pinpointing Scale-dependent Integer Overflow Bugs in Large-scale Parallel Applications, SC, vol.19, p.12, 2016. ,
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis, CGO, vol.154, p.164, 2014. ,
Dataflow Analysis of Array and Scalar References, International Journal of Parallel Programming, vol.20, issue.1, pp.23-53, 1991. ,
, Pointless Tainting?: Evaluating the Practicality of Pointer Tainting, pp.61-74, 2009.
, Strict Control Dependence and Its Effect on Dynamic Information Flow Analyses. ISSTA, pp.13-24, 2010.
Parfait: Designing a Scalable Bug Checker, Proceedings of the 2008 Workshop on Static Analysis, pp.4-11, 2008. ,
Automatic formal verification of mpi-based parallel programs, SIGPLAN Not, vol.46, issue.8, pp.309-310, 2011. ,
Civl: the concurrency intermediate verification language, pp.1-12, 2015. ,
Symbolic Analysis of Concurrency Errors in OpenMP Programs, ICPP, vol.00, pp.510-516, 2013. ,
Verifying MPI Applications with Sim-GridMC, Correctness, 2017. ,
UPC-SPIN: a framework for the model checking of UPC programs, 2011. ,
GPUVerify: A Verifier for GPU Kernels, OOPSLA, pp.113-132, 2012. ,
Runtime MPI Collective Checking with Tree-based Overlay Networks, EuroMPI, pp.129-134, 2013. ,
UPC-CHECK: a scalable tool for detecting run-time errors in Unified Parallel C, Computer Science -Research and Development, vol.28, issue.2, pp.203-209, 2013. ,
MPI-PHYLIP: Parallelizing Computationally Intensive Phylogenetic Analysis Routines for the Analysis of Large Protein Families, PLOS ONE, vol.5, issue.11, pp.1-8, 2010. ,
Improving Performance via Mini-applications, 2009. ,