Journal of the ACM (JACM)
A Fast and Usually Linear Algorithm for Global Flow Analysis
Journal of the ACM (JACM)
Data Flow Analysis in Software Reliability
ACM Computing Surveys (CSUR)
An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Programmers use slices when debugging
Communications of the ACM
Certification of programs for secure information flow
Communications of the ACM
Communications of the ACM
A program data flow analysis procedure
Communications of the ACM
A unified approach to global program optimization
POPL '73 Proceedings of the 1st annual ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Flow Analysis of Computer Programs
Flow Analysis of Computer Programs
PASCAL user manual and report
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
The theory of parsing, translation, and compiling
The theory of parsing, translation, and compiling
Proceedings of an ACM conference on Language design for reliable software
Combining Static Concurrency Analysis with Symbolic Execution
IEEE Transactions on Software Engineering
The implications of program dependencies for software testing, debugging, and maintenance
TAV3 Proceedings of the ACM SIGSOFT '89 third symposium on Software testing, analysis, and verification
Automated Software Test Data Generation
IEEE Transactions on Software Engineering
IEEE Transactions on Software Engineering
Approximate Reasoning About the Semantic Effects of Program Changes
IEEE Transactions on Software Engineering
Dynamic slicing in the presence of unconstrained pointers
TAV4 Proceedings of the symposium on Testing, analysis, and verification
Using Program Slicing in Software Maintenance
IEEE Transactions on Software Engineering
On slicing programs with jump statements
PLDI '94 Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation
A new model of program dependences for reverse engineering
SIGSOFT '94 Proceedings of the 2nd ACM SIGSOFT symposium on Foundations of software engineering
Aspect: detecting bugs with abstract dependences
ACM Transactions on Software Engineering and Methodology (TOSEM)
SPARK—an annotated Ada subset for safety-critical programming
TRI-Ada '90 Proceedings of the conference on TRI-ADA '90
Dependency analysis of Ada programs
Proceedings of the 1998 annual ACM SIGAda international conference on Ada
Industrial experience with SPARK
ACM SIGAda Ada Letters - special issue on presentations from SIGAda 2000
Beyond ASIS: program data bases and tool-oriented queries
Proceedings of the 2001 annual ACM SIGAda international conference on Ada
Equivalence analysis and its application in improving the efficiency of program slicing
ACM Transactions on Software Engineering and Methodology (TOSEM)
Industrial strength exception freedom
Proceedings of the 2002 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Programming faults and errors: Towards a theory of software incorrectness
Annals of Software Engineering
Is Proof More Cost-Effective Than Testing?
IEEE Transactions on Software Engineering
Logic versus Magic in Critical Systems
Ada Europe '01 Proceedings of the 6th Ade-Europe International Conference Leuven on Reliable Software Technologies
Closing the Loop: The Influence of Code Analysis on Design
Ada-Europe '02 Proceedings of the 7th Ada-Europe International Conference on Reliable Software Technologies
A Family-Oriented Software Development Process for Engine Controllers
PROFES '01 Proceedings of the Third International Conference on Product Focused Software Process Improvement
The Value of Verification: Positive Experience of Industrial Proof
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume II
CONVERSE: a family-oriented software development process for engine controllers
Systems engineering for business process change
Static analysis of Ravenscar programs
IRTAW '03 Proceedings of the 12th international workshop on Real-time Ada
Enforcing security and safety models with an information flow analysis tool
Proceedings of the 2004 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
A brief survey of program slicing
ACM SIGSOFT Software Engineering Notes
A theory for execution-time derivation in real-time programs
Theoretical Computer Science - Quantitative aspects of programming languages (QAPL 2004)
An Integrated Approach to High Integrity Software Verification
Journal of Automated Reasoning
Verification condition generation for conditional information flow
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Using computing-all-slices algorithm in measuring functional cohesion
SE'07 Proceedings of the 25th conference on IASTED International Multi-Conference: Software Engineering
An efficient algorithm for computing all program static slices
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
Specification and Checking of Software Contracts for Conditional Information Flow
FM '08 Proceedings of the 15th international symposium on Formal Methods
A flow calculus of mwp-bounds for complexity analysis
ACM Transactions on Computational Logic (TOCL)
Program transformations for information personalization
Computer Languages, Systems and Structures
Ada-Europe'03 Proceedings of the 8th Ada-Europe international conference on Reliable software technologies
From exponential to polynomial-time security typing via principal types
ESOP'11/ETAPS'11 Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software
Identification of extract method refactoring opportunities for the decomposition of methods
Journal of Systems and Software
Smart certification of mixed criticality systems
Ada-Europe'05 Proceedings of the 10th Ada-Europe international conference on Reliable Software Technologies
Feasibility study of software reengineering towards role-based access control
International Journal of Computer Applications in Technology
ESOP'10 Proceedings of the 19th European conference on Programming Languages and Systems
SPARKSkein: a formal and fast reference implementation of skein
SBMF'11 Proceedings of the 14th Brazilian conference on Formal Methods: foundations and Applications
A vocabulary of program slicing-based techniques
ACM Computing Surveys (CSUR)
A lightweight technique for distributed and incremental program verification
VSTTE'12 Proceedings of the 4th international conference on Verified Software: theories, tools, experiments
Towards dynamic backward slicing of model transformations
ASE '11 Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering
A certificate infrastructure for machine-checked proofs of conditional information flow
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Idea: writing secure c programs with secprove
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Using citation influence to predict software defects
Proceedings of the 10th Working Conference on Mining Software Repositories
Hi-index | 0.00 |
Until recently, information-flow analysis has been used primarily to verify that information transmission between program variables cannot violate security requirements. Here, the notion of information flow is explored as an aid to program development and validation.Information-flow relations are presented for while-programs, which identify those program statements whose execution may cause information to be transmitted from or to particular input, internal, or output values. It is shown with examples how these flow relations can be helpful in writing, testing, and updating programs; they also usefully extend the class of errors which can be detected automatically in the “static analysis” of a program.