|
Search the dblp DataBase
Dawson R. Engler:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dawson R. Engler, Todd A. Proebsting
DCG: An Efficient, Retargetable Dynamic Code Generation System. [Citation Graph (0, 0)][DBLP] ASPLOS, 1994, pp:263-272 [Conf]
- Andy Chou, Benjamin Chelf, Dawson R. Engler, Mark Heinrich
Using Meta-level Compilation to Check FLASH Protocol Code. [Citation Graph (0, 0)][DBLP] ASPLOS, 2000, pp:59-70 [Conf]
- Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler
MECA: an extensible, expressive system and language for statically checking security properties. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:321-334 [Conf]
- Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler
EXE: automatically generating inputs of death. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:322-335 [Conf]
- Dawson R. Engler
Static Analysis Versus Model Checking for Bug Finding. [Citation Graph (0, 0)][DBLP] CONCUR, 2005, pp:1- [Conf]
- Dawson R. Engler
Incorporating Application Semantics and Control into Compilation. [Citation Graph (0, 0)][DBLP] DSL, 1997, pp:- [Conf]
- Dawson R. Engler, Wilson C. Hsieh
Derive: a tool that automatically reverse-engineers instruction encodings. [Citation Graph (0, 0)][DBLP] Dynamo, 2000, pp:12-22 [Conf]
- Ted Kremenek, Andrew Y. Ng, Dawson R. Engler
A Factor Graph Model for Software Bug Finding. [Citation Graph (0, 0)][DBLP] IJCAI, 2007, pp:2510-2516 [Conf]
- David Lie, Andy Chou, Dawson R. Engler, David L. Dill
A simple method for extracting models for protocol code. [Citation Graph (0, 0)][DBLP] ISCA, 2001, pp:192-203 [Conf]
- Madanlal Musuvathi, Dawson R. Engler
Model Checking Large Network Protocol Implementations. [Citation Graph (0, 0)][DBLP] NSDI, 2004, pp:155-168 [Conf]
- Madanlal Musuvathi, David Y. W. Park, Andy Chou, Dawson R. Engler, David L. Dill
CMC: A Pragmatic Approach to Model Checking Real Code. [Citation Graph (0, 0)][DBLP] OSDI, 2002, pp:- [Conf]
- Dawson R. Engler, Benjamin Chelf, Andy Chou, Seth Hallem
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. [Citation Graph (0, 0)][DBLP] OSDI, 2000, pp:1-16 [Conf]
- Dawson R. Engler, M. Frans Kaashoek, James O'Toole
The Exokernel Approach to Operating System Extensibility (Panel Statement). [Citation Graph (0, 0)][DBLP] OSDI, 1994, pp:198- [Conf]
- Junfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi
Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP] OSDI, 2004, pp:273-288 [Conf]
- Ted Kremenek, Paul Twohey, Godmar Back, Andrew Y. Ng, Dawson R. Engler
From Uncertainty to Belief: Inferring the Specification Within. [Citation Graph (0, 0)][DBLP] OSDI, 2006, pp:161-176 [Conf]
- Junfeng Yang, Can Sar, Dawson R. Engler
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. [Citation Graph (0, 0)][DBLP] OSDI, 2006, pp:131-146 [Conf]
- Benjamin Chelf, Dawson R. Engler, Seth Hallem
How to write system-specific, static checkers in metal. [Citation Graph (0, 0)][DBLP] PASTE, 2002, pp:51-60 [Conf]
- Dawson R. Engler
VCODE: a Retargetable, Extensible, Very Fast Dynamic Code Generation System. [Citation Graph (0, 0)][DBLP] PLDI, 1996, pp:160-170 [Conf]
- Seth Hallem, Benjamin Chelf, Yichen Xie, Dawson R. Engler
A System and Language for Building System-Specific, Static Analyses. [Citation Graph (0, 0)][DBLP] PLDI, 2002, pp:69-82 [Conf]
- Massimiliano Poletto, Dawson R. Engler, M. Frans Kaashoek
tcc: A System for Fast, Flexible, and High-level Dynamic Code Generation. [Citation Graph (0, 0)][DBLP] PLDI, 1997, pp:109-121 [Conf]
- Dawson R. Engler, Wilson C. Hsieh, M. Frans Kaashoek
`C: A Language for High-Level, Efficient, and Machine-Independent Dynamic Code Generation. [Citation Graph (0, 0)][DBLP] POPL, 1996, pp:131-144 [Conf]
- Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner
Cool security trends. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:53- [Conf]
- Ted Kremenek, Dawson R. Engler
Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations. [Citation Graph (0, 0)][DBLP] SAS, 2003, pp:295-315 [Conf]
- Dawson R. Engler, M. Frans Kaashoek
DPF: Fast, Flexible Message Demultiplexing Using Dynamic Code Generation. [Citation Graph (0, 0)][DBLP] SIGCOMM, 1996, pp:53-59 [Conf]
- Deborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek
ASHs: Application-Specific Handlers for High-Performance Messaging. [Citation Graph (0, 0)][DBLP] SIGCOMM, 1996, pp:40-52 [Conf]
- Dawson R. Engler, M. Frans Kaashoek, James O'Toole
The Operating System Kernel as a Secure Programmable Machine. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1994, pp:62-67 [Conf]
- M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Deborah A. Wallach
Server operating systems. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1996, pp:141-148 [Conf]
- Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R. Engler
Correlation exploitation in error ranking. [Citation Graph (0, 0)][DBLP] SIGSOFT FSE, 2004, pp:83-93 [Conf]
- Yichen Xie, Andy Chou, Dawson R. Engler
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. [Citation Graph (0, 0)][DBLP] ESEC / SIGSOFT FSE, 2003, pp:327-336 [Conf]
- Yichen Xie, Dawson R. Engler
Using redundancies to find errors. [Citation Graph (0, 0)][DBLP] SIGSOFT FSE, 2002, pp:51-60 [Conf]
- Andy Chou, Junfeng Yang, Benjamin Chelf, Seth Hallem, Dawson R. Engler
An Empirical Study of Operating System Errors. [Citation Graph (0, 0)][DBLP] SOSP, 2001, pp:73-88 [Conf]
- Dawson R. Engler, Ken Ashcraft
RacerX: effective, static detection of race conditions and deadlocks. [Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:237-252 [Conf]
- Dawson R. Engler, David Yu Chen, Andy Chou
Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code. [Citation Graph (0, 0)][DBLP] SOSP, 2001, pp:57-72 [Conf]
- Dawson R. Engler, M. Frans Kaashoek, James O'Toole
Exokernel: An Operating System Architecture for Application-Level Resource Management. [Citation Graph (0, 0)][DBLP] SOSP, 1995, pp:251-266 [Conf]
- M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceño, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, Kenneth Mackenzie
Application Performance and Flexibility on Exokernel Systems. [Citation Graph (0, 0)][DBLP] SOSP, 1997, pp:52-65 [Conf]
- Ken Ashcraft, Dawson R. Engler
Using Programmer-Written Compiler Extensions to Catch Security Holes. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:143-159 [Conf]
- Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler
Automatically Generating Malicious Disks using Symbolic Execution. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:243-257 [Conf]
- Cristian Cadar, Dawson R. Engler
Execution Generated Test Cases: How to Make Systems Code Crash Itself. [Citation Graph (0, 0)][DBLP] SPIN, 2005, pp:2-23 [Conf]
- Wilson C. Hsieh, Dawson R. Engler, Godmar Back
Reverse-Engineering Instruction Encodings. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2001, pp:133-145 [Conf]
- Dawson R. Engler, Madanlal Musuvathi
Static Analysis versus Software Model Checking for Bug Finding. [Citation Graph (0, 0)][DBLP] VMCAI, 2004, pp:191-210 [Conf]
- Madanlal Musuvathi, Dawson R. Engler
Some Lessons from Using Static Analysis and Software Model Checking for Bug Finding. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2003, v:89, n:3, pp:- [Journal]
- Seth Hallem, David Park, Dawson R. Engler
Uprooting Software Defects at the Source. [Citation Graph (0, 0)][DBLP] ACM Queue, 2003, v:1, n:8, pp:64-71 [Journal]
- Dawson R. Engler, M. Frans Kaashoek, James O'Toole
The Operating System Kernel as a Secure Programmable Machine. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1995, v:29, n:1, pp:78-82 [Journal]
- Gregory R. Ganger, Dawson R. Engler, M. Frans Kaashoek, Héctor M. Briceño, Russell Hunt, Thomas Pinckney
Fast and flexible application-level networking on exokernel systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2002, v:20, n:1, pp:49-83 [Journal]
- Junfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi
Using model checking to find serious file system errors. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2006, v:24, n:4, pp:393-423 [Journal]
- Deborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek
ASHs application-specific handlers for high-performance messaging. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:460-474 [Journal]
- Massimiliano Poletto, Wilson C. Hsieh, Dawson R. Engler, M. Frans Kaashoek
'C and tcc: A Language and Compiler for Dynamic Code Generation. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 1999, v:21, n:2, pp:324-369 [Journal]
- Dawson R. Engler
Interface Compilation: Steps Toward Compiling Program Interfaces as Languages. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1999, v:25, n:3, pp:387-400 [Journal]
- Yichen Xie, Dawson R. Engler
Using Redundancies to Find Errors. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2003, v:29, n:10, pp:915-928 [Journal]
- Dawson R. Engler, Daniel Dunbar
Under-constrained execution: making automatic code destruction easy and scalable. [Citation Graph (0, 0)][DBLP] ISSTA, 2007, pp:1-4 [Conf]
A System's Hackers Crash Course: Techniques that Find Lots of Bugs in Real (Storage) System Code. [Citation Graph (, )][DBLP]
Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems. [Citation Graph (, )][DBLP]
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. [Citation Graph (, )][DBLP]
Model checking system software with CMC. [Citation Graph (, )][DBLP]
RWset: Attacking Path Explosion in Constraint-Based Test Generation. [Citation Graph (, )][DBLP]
A few billion lines of code later: using static analysis to find bugs in the real world. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.010secs
|