Merlin
- 15 June 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 44 (6), 75-86
- https://doi.org/10.1145/1542476.1542485
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Specification Mining with Few False PositivesLecture Notes in Computer Science, 2009
- Labels and event processes in the Asbestos operating systemACM Transactions on Computer Systems, 2007
- Defending Against Injection Attacks Through Context-Sensitive String EvaluationLecture Notes in Computer Science, 2006
- Abstraction and refinement in probabilistic systemsACM SIGMETRICS Performance Evaluation Review, 2005
- Automatically Hardening Web Applications Using Precise TaintingPublished by Springer Science and Business Media LLC ,2005
- Mining Temporal Specifications for Error DetectionLecture Notes in Computer Science, 2005
- Securing web application code by static analysis and runtime protectionPublished by Association for Computing Machinery (ACM) ,2004
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Factor graphs and the sum-product algorithmIEEE Transactions on Information Theory, 2001
- An axiomatic basis for computer programmingCommunications of the ACM, 1969