Kiss Á et al. Interprocedural Static Slicing of Binary Executables. (2003) Megjelent: IEEE International Workshop on Source Code Analysis and Manipulation pp. 118-127,
212882
Mei R. et al. Application Research of Slicing Technology of Binary Executables in Malware Detection. (2021) Journal of Cyber Security 2096-1146 6 3 125-140
Chevalier R. et al. Bootkeeper: Validating software integrity properties on boot firmware images. (2019) Megjelent: 9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019 pp. 315-325
Welton B. et al. Exposing hidden performance opportunities in high performance GPU applications. (2018) Megjelent: 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2018 pp. 301-310
Mangean A et al. BEST: A Binary Executable Slicing Tool. (2016) Megjelent: 16th International Workshop on Worst-Case Execution Time Analysis, WCET 2016 pp. 7.1-7.10
Patel SD et al. Static detection of shared object loadings on linux (Ubuntu 14.10). (2015) Megjelent: 1st International Conference on Computing, Communication, Control and Automation, ICCUBEA 2015 pp. 589-593
Rawat S et al. LiSTT: An investigation into unsound-incomplete yet practical result yielding static taintflow analysis. (2014) Megjelent: 9th International Conference on Availability, Reliability and Security, ARES 2014 pp. 498-505
Kargen U et al. Efficient utilization of secondary storage for scalable dynamic slicing. (2014) Megjelent: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014 pp. 155-164
Jacobson Emily R et al. Detecting code reuse attacks with a model of conformant program execution. (2014) Megjelent: International Symposium on Engineering Secure Software and Systems pp. 1-18
Bernat AR et al. Structured binary editing with a CFG transformation algebra. (2012) Megjelent: 19th Working Conference on Reverse Engineering, WCRE 2012 pp. 9-18
Kwon T. et al. Static detection of unsafe component loadings. (2012) Megjelent: 21st International Conference on Compiler Construction, CC 2012, Held as Part of the European Joint Conferences on Theory and P... pp. 122-143
Craig Miles et al. In situ reuse of logically extracted functional components. (2012) JOURNAL IN COMPUTER VIROLOGY 1772-9890 1771-9904 1772-9904 8 3 73-84
Shi S. et al. Executable program slicing. (2012) Megjelent: 2012 International Applied Mechanics, Mechatronics Automation Symposium, IAMMAS 2012 pp. 1746-1750
Jin W et al. Binary function clustering using semantic hashes. (2012) Megjelent: 2012 11th International Conference on Machine Learning and Applications pp. 386-391
Mariamma Chacko et al. Validation of microcontroller codes: an architecture oriented approach. (2011) INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS 1756-378X 1756-3798 4 4 442-464
Jacobson E.R. et al. Labeling library functions in stripped binaries. (2011) Megjelent: ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering pp. 1-8
Bernat AR et al. Efficient, sensitivity resistant binary instrumentation. (2011) Megjelent: 20th International Symposium on Software Testing and Analysis, ISSTA 2011 pp. 89-99
Chacko M et al. Validation of embedded software through static analysis of machine codes. (2009) Megjelent: 2009 IEEE International Advance Computing Conference, IACC 2009 pp. 1596-1601
Chacko M et al. Optimization of bank switching instructions in embedded systems through static analysis of machine codes. (2009) Megjelent: 2009 IEEE International Advance Computing Conference, IACC 2009 pp. 76-80
Pungila C. A bray-curtis weighted automaton for detecting malicious code through system-call analysis. (2009) Megjelent: 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2009 pp. 392-400
Gu L et al. Remote attestation on program execution. (2008) Megjelent: 3rd ACM Workshop on Scalable Trusted Computing, STC'08, Co-located with the 15th ACM Computer and Communications Security Confe... pp. 11-19
Reps T. et al. Improved memory-access analysis for x86 executables. (2008) Megjelent: 17th International Conference on Compiler Construction, CC 2008 pp. 16-35
Purui S. et al. Exploring malware behaviors based on environment constitution. (2008) Megjelent: 2008 International Conference on Computational Intelligence and Security, CIS 2008 pp. 320-325
Zhang J et al. Parameter and return-value analysis of binary executables. (2007) Megjelent: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007 pp. 501-508
Molina A.J.M. et al. Fast approximate matching of programs for protecting libre/open source software by using spatial indexes. (2007) Megjelent: 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007 pp. 111-120
Bermudo N et al. Control flow graph reconstruction for assembly language programs with delayed instructions. (2005) Megjelent: Proceedings - Fifth IEEE International Workshop on Source Code Analysis and Manipulation, SCAM 2005 pp. 107-116
Subrato K De et al. Code Size reduction by difference classification and customized look-up table generation. (2009) Megjelent: Open64 Workshop at CGO 2009 pp. 1-10
Ákos Kiss et al. Using dynamic information in the interprocedural static slicing of binary executables. (2005) SOFTWARE QUALITY JOURNAL 0963-9314 13 3 227-245,
1737157
Szakcikk (Folyóiratcikk) | Tudományos[1737157]
Fu Xiang. On detecting environment sensitivity using slicing. (2016) THEORETICAL COMPUTER SCIENCE 0304-3975 1879-2294 656 27-45
Jin W et al. Recovering C++ objects from binaries using inter-procedural data-flow analysis. (2014) Megjelent: 2014 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, PPREW 2014
Pranith D Kumar et al. Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities. (2009) Megjelent: Proceeding ISEC '09 Proceedings of the 2nd India software engineering conference pp. 141-142
Egyéb konferenciaközlemény[21707447] [Admin láttamozott]
Purui S. et al. Exploring malware behaviors based on environment constitution. (2008) Megjelent: 2008 International Conference on Computational Intelligence and Security, CIS 2008 pp. 320-325
Beszédes Á. Computation of Static Execute After Relation with Applications to Software Maintenance. (2007) Megjelent: Proceedings of the 2007 IEEE International Conference on Software Maintenance (ICSM2007) pp. 295-304,
1426291
Cai Haipeng et al. Method-level program dependence abstraction and its application to impact analysis. (2016) JOURNAL OF SYSTEMS AND SOFTWARE 0164-1212 122 311-326
Kashima Y et al. Comparison of backward slicing techniques for java. (2015) IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 0916-8532 1745-1361 E98D 1 119-130
Cai H et al. Abstracting Program Dependencies Using the Method Dependence Graph. (2015) Megjelent: IEEE International Conference on Software Quality, Reliability and Security, QRS 2015 pp. 49-58
Lehnert Steffen et al. Rule-based Impact Analysis for Heterogeneous Software Artifacts. (2013) Megjelent: 2013 17th European Conference on Software Maintenance and Reengineering pp. 209-218
Binkley David et al. Efficient Identification of Linchpin Vertices in Dependence Clusters. (2013) ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 0164-0925 35 2 7:1-7:35
Gethers M et al. Combining conceptual and domain-based couplings to detect database and code dependencies. (2012) Megjelent: 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation, SCAM 2012 pp. 144-153
Gethers M et al. Using Relational Topic Models to capture coupling among classes in object-oriented software systems. (2010) Megjelent: 2010 IEEE International Conference on Software Maintenance, ICSM 2010
Jász J. Static Execute After/Before as a Replacement of Traditional Software Dependencies. (2008) Megjelent: Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM 2008) pp. 137-146,
1426287
Blondeau V et al. Test case selection in industry: an analysis of issues related to static approaches. (2017) SOFTWARE QUALITY JOURNAL 0963-9314 25 4 1203-1237
Cai Haipeng et al. Method-level program dependence abstraction and its application to impact analysis. (2016) JOURNAL OF SYSTEMS AND SOFTWARE 0164-1212 122 311-326
Cai H et al. DiaPro: Unifying dynamic impact analyses for improved and variable cost-effectiveness. (2016) ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 1049-331X 25 2
Angerer F et al. Configuration-aware change impact analysis. (2016) Megjelent: 30th IEEE/ACM International Conference on Automated Software Engineering, ASE 2015 pp. 385-395
Kashima Y. Variable data-flow graph for lightweight program slicing and visualization. (2015) IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 0916-8532 1745-1361 E98D 6 1194-1205
Eyal Salman et al. Feature-level change impact analysis using formal concept analysis. (2015) INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 0218-1940 25 1 69-92
Kashima Y et al. Comparison of backward slicing techniques for java. (2015) IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 0916-8532 1745-1361 E98D 1 119-130
Cai H. A framework for cost-effective dependence-based dynamic impact analysis. (2015) Megjelent: 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015 pp. 231-240
Cai H et al. Abstracting Program Dependencies Using the Method Dependence Graph. (2015) Megjelent: IEEE International Conference on Software Quality, Reliability and Security, QRS 2015 pp. 49-58
Nagy Csaba. Static Analysis of Data-Intensive Applications. (2013) Megjelent: 2013 17th European Conference on Software Maintenance and Reengineering pp. 435-438
Ishio T. A lightweight visualization of interprocedural data-flow paths for source code reading. (2012) Megjelent: 2012 20th IEEE International Conference on Program Comprehension, ICPC 2012 pp. 37-46
Ferenc Fischer. The Comparison of Hybrid Impact Sets Computed During the Application in Different Areas. (2010) Megjelent: 7th Conference of PhD Students in Computer Science, CSCS 2010 p. 30
Egyéb konferenciaközlemény[21746575] [Admin láttamozott]
Tóth G. A comparison of programmers' opinions in change impact analysis. (2010) PERIODICA POLYTECHNICA-ELECTRICAL ENGINEERING 0324-6000 1587-3781 2064-5260 2064-5279 54 3-4 111-121
László Vidács et al. Combining Preprocessor Slicing with C/C++ Language Slicing. (2008) Megjelent: Proceedings of the 16th IEEE International Conference on Program Comprehension (ICPC'08) pp. 163-171,
1739715
Frederik Kanning et al. Program Slicing in the Presence of Preprocessor Variability. (2014) Megjelent: 30th International Conference on Software Maintenance and Evolution, ICSME 2014 pp. 501-505
Lillack M. Program slicing to understand software generators. (2013) Megjelent: 5th Int. Workshop on Feature-Oriented Software Development, FOSD 2013 - Co-located with 12th Int. Conf. on Generative Programmi... pp. 41-48
Jörg Liebig et al. Analyzing the discipline of preprocessor annotations in 30 million lines of C code. (2011) Megjelent: AOSD '11 Proceedings of the tenth international conference on Aspect-oriented software development pp. 191-202
Zhe Han et al. A Novel Algorithm for Construction Control Dependence Subgraph. (2009) Megjelent: International Conference on Multimedia Information Networking and Security, 2009 pp. 158-162
Gabriella Tóth. CIASYS - Change Impact Analysis at System Level. (2010) Megjelent: 14th European Conference on Software Maintenance and Reengineering (CSMR 2010) pp. 198-201,
1781709
Schrettner Lajos et al. Impact analysis using static execute after in webkit. (2012) Megjelent: 2012 16th European Conference on Software Maintenance and Reengineering (CSMR) pp. 95-104
Tóth G et al. Comparison of different impact analysis methods and programmer's opinion - an empirical study. (2010) Megjelent: Proceedigns of PPPJ 2010 (8th International Conference on the Principles and Practice in Java) pp. 109-118,
1437942
Cai Haipeng et al. Method-level program dependence abstraction and its application to impact analysis. (2016) JOURNAL OF SYSTEMS AND SOFTWARE 0164-1212 122 311-326
Wetzlmaier T et al. Improving manual change impact analysis with tool support: A study in an industrial project. (2015) LECTURE NOTES IN BUSINESS INFORMATION PROCESSING 1865-1348 200 47-66
Árpád Beszédes et al. Code Coverage-Based Regression Test Selection and Prioritization in WebKit. (2012) Megjelent: Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM) pp. 46-55,
2160824
Ramler R et al. Tool support for change-based regression testing: An industry experience report. (2017) LECTURE NOTES IN BUSINESS INFORMATION PROCESSING 1865-1348 269 133-152
Chen J. Learning to Prioritize Test Programs for Compiler Testing. (2017) Megjelent: 39th IEEE/ACM International Conference on Software Engineering, ICSE 2017 pp. 700-711
Blondeau Vincent et al. Test case selection in industry: an analysis of issues related to static approaches. (2016) SOFTWARE QUALITY JOURNAL 0963-9314 na 1-35
Haraty Ramzi A et al. Regression Test Cases Prioritization Using Clustering and Code Change Relevance. (2016) INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 0218-1940 26 5 733-768
Hridoy Syed. Regression Testing based on Hamming Distance and Code Coverage. (2015) INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS 0975-8887 120 14 p. na
Musa S et al. Regression test cases selection for object-oriented programs based on affected statements. (2015) International Journal of Software Engineering and Its Applications 1738-9984 9 10 91-108
Zhang N et al. Multi-objective optimization based on-line adjustment strategy of test case prioritization. (2015) RUAN JIAN XUE BAO / JOURNAL OF SOFTWARE 1000-9825 26 10 2451-2464
Ekelund ED et al. Efficient regression testing based on test history: An industrial evaluation. (2015) Megjelent: 2015 IEEE International Conference on Software Maintenance and Evolution pp. 449-457
Musa Samaila et al. Regression test case selection & prioritization using dependence graph and genetic algorithm. (2014) IOSR JOURNAL OF COMPUTER ENGINEERING 2278-8727 2278-0661 16 3 38-47
Musa Samaila et al. A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm. (2014) Research Inventy: International Journal of Engineering and Science 2319-6483 4 7 54-64
Jász J et al. Impact Analysis Using Static Execute After in WebKit. (2012) Megjelent: 2012 16th European Conference on Software Maintenance and Reengineering pp. 95-104,
2001476
Cai Haipeng et al. Method-level program dependence abstraction and its application to impact analysis. (2016) JOURNAL OF SYSTEMS AND SOFTWARE 0164-1212 122 311-326
Kashima Yu et al. Comparison of backward slicing techniques for java. (2015) IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 0916-8532 1745-1361 98 1 119-130
Cai H et al. Abstracting Program Dependencies Using the Method Dependence Graph. (2015) Megjelent: IEEE International Conference on Software Quality, Reliability and Security, QRS 2015 pp. 49-58
Cai H et al. SENSA: Sensitivity analysis for quantitative change-impact prediction. (2014) Megjelent: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014 pp. 165-174