Author of the publication

Analyzing Memory Accesses in x86 Executables.

, and . CC, volume 2985 of Lecture Notes in Computer Science, page 5-23. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Memory Accesses in x86 Executables., and . CC, volume 2985 of Lecture Notes in Computer Science, page 5-23. Springer, (2004)Scalable and precise program analysis at NEC., , , , , , , , , and 1 other author(s). FMCAD, page 273-274. IEEE, (2010)Scalable and scope-bounded software verification in Varvel., , , , , , , and . Autom. Softw. Eng., 22 (4): 517-559 (2015)Object Model Construction for Inheritance in C++ and Its Applications to Program Analysis., , , , , , , and . CC, volume 7210 of Lecture Notes in Computer Science, page 144-164. Springer, (2012)SETSUDŌ: perturbation-based testing framework for scalable distributed systems., , , , and . TRIOS@SOSP, page 7:1-7:14. ACM, (2013)PED: Proof-Guided Error Diagnosis by Triangulation of Program Error Causes., and . SEFM, page 268-278. IEEE Computer Society, (2008)Extended Weighted Pushdown Systems., , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 434-448. Springer, (2005)Interprocedural Exception Analysis for C++., , , , and . ECOOP, volume 6813 of Lecture Notes in Computer Science, page 583-608. Springer, (2011)Improved Memory-Access Analysis for x86 Executables., and . CC, volume 4959 of Lecture Notes in Computer Science, page 16-35. Springer, (2008)WYSINWYX: What You See Is Not What You eXecute., , , and . VSTTE, volume 4171 of Lecture Notes in Computer Science, page 202-213. Springer, (2005)