The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dawson R. Engler: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dawson R. Engler, Todd A. Proebsting
    DCG: An Efficient, Retargetable Dynamic Code Generation System. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 1994, pp:263-272 [Conf]
  2. Andy Chou, Benjamin Chelf, Dawson R. Engler, Mark Heinrich
    Using Meta-level Compilation to Check FLASH Protocol Code. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:59-70 [Conf]
  3. Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler
    MECA: an extensible, expressive system and language for statically checking security properties. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:321-334 [Conf]
  4. Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler
    EXE: automatically generating inputs of death. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:322-335 [Conf]
  5. Dawson R. Engler
    Static Analysis Versus Model Checking for Bug Finding. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2005, pp:1- [Conf]
  6. Dawson R. Engler
    Incorporating Application Semantics and Control into Compilation. [Citation Graph (0, 0)][DBLP]
    DSL, 1997, pp:- [Conf]
  7. Dawson R. Engler, Wilson C. Hsieh
    Derive: a tool that automatically reverse-engineers instruction encodings. [Citation Graph (0, 0)][DBLP]
    Dynamo, 2000, pp:12-22 [Conf]
  8. Ted Kremenek, Andrew Y. Ng, Dawson R. Engler
    A Factor Graph Model for Software Bug Finding. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2007, pp:2510-2516 [Conf]
  9. David Lie, Andy Chou, Dawson R. Engler, David L. Dill
    A simple method for extracting models for protocol code. [Citation Graph (0, 0)][DBLP]
    ISCA, 2001, pp:192-203 [Conf]
  10. Madanlal Musuvathi, Dawson R. Engler
    Model Checking Large Network Protocol Implementations. [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:155-168 [Conf]
  11. Madanlal Musuvathi, David Y. W. Park, Andy Chou, Dawson R. Engler, David L. Dill
    CMC: A Pragmatic Approach to Model Checking Real Code. [Citation Graph (0, 0)][DBLP]
    OSDI, 2002, pp:- [Conf]
  12. Dawson R. Engler, Benjamin Chelf, Andy Chou, Seth Hallem
    Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. [Citation Graph (0, 0)][DBLP]
    OSDI, 2000, pp:1-16 [Conf]
  13. Dawson R. Engler, M. Frans Kaashoek, James O'Toole
    The Exokernel Approach to Operating System Extensibility (Panel Statement). [Citation Graph (0, 0)][DBLP]
    OSDI, 1994, pp:198- [Conf]
  14. Junfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi
    Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:273-288 [Conf]
  15. Ted Kremenek, Paul Twohey, Godmar Back, Andrew Y. Ng, Dawson R. Engler
    From Uncertainty to Belief: Inferring the Specification Within. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:161-176 [Conf]
  16. Junfeng Yang, Can Sar, Dawson R. Engler
    EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:131-146 [Conf]
  17. Benjamin Chelf, Dawson R. Engler, Seth Hallem
    How to write system-specific, static checkers in metal. [Citation Graph (0, 0)][DBLP]
    PASTE, 2002, pp:51-60 [Conf]
  18. Dawson R. Engler
    VCODE: a Retargetable, Extensible, Very Fast Dynamic Code Generation System. [Citation Graph (0, 0)][DBLP]
    PLDI, 1996, pp:160-170 [Conf]
  19. Seth Hallem, Benjamin Chelf, Yichen Xie, Dawson R. Engler
    A System and Language for Building System-Specific, Static Analyses. [Citation Graph (0, 0)][DBLP]
    PLDI, 2002, pp:69-82 [Conf]
  20. Massimiliano Poletto, Dawson R. Engler, M. Frans Kaashoek
    tcc: A System for Fast, Flexible, and High-level Dynamic Code Generation. [Citation Graph (0, 0)][DBLP]
    PLDI, 1997, pp:109-121 [Conf]
  21. Dawson R. Engler, Wilson C. Hsieh, M. Frans Kaashoek
    `C: A Language for High-Level, Efficient, and Machine-Independent Dynamic Code Generation. [Citation Graph (0, 0)][DBLP]
    POPL, 1996, pp:131-144 [Conf]
  22. Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner
    Cool security trends. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:53- [Conf]
  23. Ted Kremenek, Dawson R. Engler
    Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations. [Citation Graph (0, 0)][DBLP]
    SAS, 2003, pp:295-315 [Conf]
  24. Dawson R. Engler, M. Frans Kaashoek
    DPF: Fast, Flexible Message Demultiplexing Using Dynamic Code Generation. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1996, pp:53-59 [Conf]
  25. Deborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek
    ASHs: Application-Specific Handlers for High-Performance Messaging. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1996, pp:40-52 [Conf]
  26. Dawson R. Engler, M. Frans Kaashoek, James O'Toole
    The Operating System Kernel as a Secure Programmable Machine. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1994, pp:62-67 [Conf]
  27. M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Deborah A. Wallach
    Server operating systems. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:141-148 [Conf]
  28. Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R. Engler
    Correlation exploitation in error ranking. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2004, pp:83-93 [Conf]
  29. Yichen Xie, Andy Chou, Dawson R. Engler
    ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:327-336 [Conf]
  30. Yichen Xie, Dawson R. Engler
    Using redundancies to find errors. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2002, pp:51-60 [Conf]
  31. Andy Chou, Junfeng Yang, Benjamin Chelf, Seth Hallem, Dawson R. Engler
    An Empirical Study of Operating System Errors. [Citation Graph (0, 0)][DBLP]
    SOSP, 2001, pp:73-88 [Conf]
  32. Dawson R. Engler, Ken Ashcraft
    RacerX: effective, static detection of race conditions and deadlocks. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:237-252 [Conf]
  33. Dawson R. Engler, David Yu Chen, Andy Chou
    Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code. [Citation Graph (0, 0)][DBLP]
    SOSP, 2001, pp:57-72 [Conf]
  34. Dawson R. Engler, M. Frans Kaashoek, James O'Toole
    Exokernel: An Operating System Architecture for Application-Level Resource Management. [Citation Graph (0, 0)][DBLP]
    SOSP, 1995, pp:251-266 [Conf]
  35. M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceño, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, Kenneth Mackenzie
    Application Performance and Flexibility on Exokernel Systems. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:52-65 [Conf]
  36. Ken Ashcraft, Dawson R. Engler
    Using Programmer-Written Compiler Extensions to Catch Security Holes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:143-159 [Conf]
  37. Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler
    Automatically Generating Malicious Disks using Symbolic Execution. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:243-257 [Conf]
  38. Cristian Cadar, Dawson R. Engler
    Execution Generated Test Cases: How to Make Systems Code Crash Itself. [Citation Graph (0, 0)][DBLP]
    SPIN, 2005, pp:2-23 [Conf]
  39. Wilson C. Hsieh, Dawson R. Engler, Godmar Back
    Reverse-Engineering Instruction Encodings. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2001, pp:133-145 [Conf]
  40. Dawson R. Engler, Madanlal Musuvathi
    Static Analysis versus Software Model Checking for Bug Finding. [Citation Graph (0, 0)][DBLP]
    VMCAI, 2004, pp:191-210 [Conf]
  41. Madanlal Musuvathi, Dawson R. Engler
    Some Lessons from Using Static Analysis and Software Model Checking for Bug Finding. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2003, v:89, n:3, pp:- [Journal]
  42. Seth Hallem, David Park, Dawson R. Engler
    Uprooting Software Defects at the Source. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2003, v:1, n:8, pp:64-71 [Journal]
  43. Dawson R. Engler, M. Frans Kaashoek, James O'Toole
    The Operating System Kernel as a Secure Programmable Machine. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:1, pp:78-82 [Journal]
  44. Gregory R. Ganger, Dawson R. Engler, M. Frans Kaashoek, Héctor M. Briceño, Russell Hunt, Thomas Pinckney
    Fast and flexible application-level networking on exokernel systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2002, v:20, n:1, pp:49-83 [Journal]
  45. Junfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi
    Using model checking to find serious file system errors. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2006, v:24, n:4, pp:393-423 [Journal]
  46. Deborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek
    ASHs application-specific handlers for high-performance messaging. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:460-474 [Journal]
  47. Massimiliano Poletto, Wilson C. Hsieh, Dawson R. Engler, M. Frans Kaashoek
    'C and tcc: A Language and Compiler for Dynamic Code Generation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1999, v:21, n:2, pp:324-369 [Journal]
  48. Dawson R. Engler
    Interface Compilation: Steps Toward Compiling Program Interfaces as Languages. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1999, v:25, n:3, pp:387-400 [Journal]
  49. Yichen Xie, Dawson R. Engler
    Using Redundancies to Find Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2003, v:29, n:10, pp:915-928 [Journal]
  50. Dawson R. Engler, Daniel Dunbar
    Under-constrained execution: making automatic code destruction easy and scalable. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2007, pp:1-4 [Conf]

  51. A System's Hackers Crash Course: Techniques that Find Lots of Bugs in Real (Storage) System Code. [Citation Graph (, )][DBLP]


  52. Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems. [Citation Graph (, )][DBLP]


  53. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. [Citation Graph (, )][DBLP]


  54. Model checking system software with CMC. [Citation Graph (, )][DBLP]


  55. RWset: Attacking Path Explosion in Constraint-Based Test Generation. [Citation Graph (, )][DBLP]


  56. A few billion lines of code later: using static analysis to find bugs in the real world. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002