[1]
M. Zitser, R. Lippmann and T. Leek: Testing static analysis tools using exploitable buffer overflows from open source code, SIGSOFT FSE, ACM, 2004, pp.97-106.
DOI: 10.1145/1041685.1029911
Google Scholar
[2]
C.A.R. Hoare: An axiomatic basis for computer programming, Communications of the ACM, 12: 10(1969), pp.576-580 and 583.
DOI: 10.1145/363235.363259
Google Scholar
[3]
E.W. Dijkstra: A discipline of programming, Series in Automatic Computation, Prentice Hall Int, (1976).
Google Scholar
[4]
D. Evans, D. Larochelle: Improving security using extensible lightweight static analysis, IEEE Software, 19: 1 (2002), pp.42-51.
DOI: 10.1109/52.976940
Google Scholar
[5]
Y. Xie, A. Chou, D. Engler: ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors, Proceedings of the 9th European Software Engineering Conference/10th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Helsinki, Finland, 2003, pp.327-336.
DOI: 10.1145/940071.940115
Google Scholar
[6]
Y. Kim, J. Lee, H. Han, K.M. Choe: Filtering false alarms of buffer overflow analysis using smt solvers, Inf. Softw. Technol, 52: 2 (2010), pp.210-219.
DOI: 10.1016/j.infsof.2009.10.004
Google Scholar
[7]
Bruno Blanchet, Patric Cousot, Radhia Cousot, Jerome Feret, Laurent Mauborgne, Antonie Mine, David Monnizux, and Xavier Rival: A static analyzer for large safety-critical software, Proceedings of the SIGPLAN Conference on Programming Language Design and Implementation, 2003, pp.196-207.
DOI: 10.1145/781131.781153
Google Scholar
[8]
P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Mine, D. Monniaux, and X. Rival: The ASTREE analyzer, Proceedings of the 14th European Symposium on Programming, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 3444 (2005), pp.21-30.
DOI: 10.1007/978-3-540-31987-0_3
Google Scholar
[9]
B. S. Gulavani, S. Chakraborty, A. V. Nori, and S. K. Rajamani: Automatically refining abstract interpretations, Technical Report TR-07-23, IIT Bombay, (2007).
Google Scholar
[10]
X. Rival: Understanding the origin of alarms in Astree", SAS, 05, LNCS, Springer, London, 3672 (2005), p.303–319.
Google Scholar
[11]
Ted Kremenek and Dawson Engler: Z-ranking: Using statistical analysis to counter the impact of static analysis approximations", Proceedings of the 10th Annual International Static Analysis Symposium (SAS, 03), Lecture Notes in Computer Science, Springer, 2694 (2003).
DOI: 10.1007/3-540-44898-5_16
Google Scholar
[12]
Y. Jung, J. Kim, J. Shin, K. Yi: Taming false alarms from a domain-unaware c analyzer by a bayesian statistical post analysis", SAS, 05, 2005, pp.203-217.
DOI: 10.1007/11547662_15
Google Scholar