|
Search the dblp DataBase
George C. Necula:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- George C. Necula, Peter Lee
Safe Kernel Extensions Without Run-Time Checking. [Citation Graph (2, 0)][DBLP] OSDI, 1996, pp:229-243 [Conf]
- George C. Necula
Proof-Carrying Code. [Citation Graph (1, 0)][DBLP] POPL, 1997, pp:106-119 [Conf]
- Sumit Gulwani, George C. Necula
A Randomized Satisfability Procedure for Arithmetic and Uninterpreted Function Symbols. [Citation Graph (0, 0)][DBLP] CADE, 2003, pp:167-181 [Conf]
- George C. Necula, Peter Lee
Proof Generation in the Touchstone Theorem Prover. [Citation Graph (0, 0)][DBLP] CADE, 2000, pp:25-44 [Conf]
- Robert R. Schneck, George C. Necula
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code. [Citation Graph (0, 0)][DBLP] CADE, 2002, pp:47-62 [Conf]
- Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula
JVer: A Java Verifier. [Citation Graph (0, 0)][DBLP] CAV, 2005, pp:144-147 [Conf]
- Christopher Colby, Peter Lee, George C. Necula
A Proof-Carrying Code Architecture for Java. [Citation Graph (0, 0)][DBLP] CAV, 2000, pp:557-560 [Conf]
- Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, George C. Necula, Grégoire Sutre, Westley Weimer
Temporal-Safety Proofs for Systems Code. [Citation Graph (0, 0)][DBLP] CAV, 2002, pp:526-538 [Conf]
- Scott McPeak, George C. Necula
Data Structure Specifications via Local Equality Axioms. [Citation Graph (0, 0)][DBLP] CAV, 2005, pp:476-490 [Conf]
- George C. Necula, Sumit Gulwani
Randomized Algorithms for Program Analysis and Verification. [Citation Graph (0, 0)][DBLP] CAV, 2005, pp:1- [Conf]
- Jeremy Condit, George C. Necula
Data Slicing: Separating the Heap into Independent Regions. [Citation Graph (0, 0)][DBLP] CC, 2005, pp:172-187 [Conf]
- Scott McPeak, George C. Necula
Elkhound: A Fast, Practical GLR Parser Generator. [Citation Graph (0, 0)][DBLP] CC, 2004, pp:73-88 [Conf]
- George C. Necula
Using Dependent Types to Port Type Systems to Low-Level Languages. [Citation Graph (0, 0)][DBLP] CC, 2006, pp:1- [Conf]
- George C. Necula, Scott McPeak, Shree Prakash Rahul, Westley Weimer
CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs. [Citation Graph (0, 0)][DBLP] CC, 2002, pp:213-228 [Conf]
- Nathan Whitehead, Martín Abadi, George C. Necula
By Reason and Authority: A System for Authorization of Proof-Carrying Code. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:236-250 [Conf]
- Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula
Enforcing Resource Bounds via Static Verification of Dynamic Checks. [Citation Graph (0, 0)][DBLP] ESOP, 2005, pp:311-325 [Conf]
- George C. Necula
A Scalable Architecture for Proof-Carrying Code. [Citation Graph (0, 0)][DBLP] FLOPS, 2001, pp:21-39 [Conf]
- Sumit Gulwani, Ashish Tiwari, George C. Necula
Join Algorithms for the Theory of Uninterpreted Functions. [Citation Graph (0, 0)][DBLP] FSTTCS, 2004, pp:311-323 [Conf]
- Matthew Harren, George C. Necula
Lightweight Wrappers for Interfacing with Binary Code in CCured. [Citation Graph (0, 0)][DBLP] ISSS, 2003, pp:209-225 [Conf]
- George C. Necula, Robert R. Schneck
Proof-Carrying Code with Untrusted Proof Rules. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:283-298 [Conf]
- George C. Necula, Robert R. Schneck
A Sound Framework for Untrusted Verification-Condition Generators. [Citation Graph (0, 0)][DBLP] LICS, 2003, pp:248-260 [Conf]
- George C. Necula, Peter Lee
Efficient Representation and Validation of Proofs. [Citation Graph (0, 0)][DBLP] LICS, 1998, pp:93-104 [Conf]
- George C. Necula, Peter Lee
Safe, Untrusted Agents Using Proof-Carrying Code. [Citation Graph (0, 0)][DBLP] Mobile Agents and Security, 1998, pp:61-91 [Conf]
- Westley Weimer, George C. Necula
Finding and preventing run-time error handling mistakes. [Citation Graph (0, 0)][DBLP] OOPSLA, 2004, pp:419-431 [Conf]
- Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula
XFI: Software Guards for System Address Spaces. [Citation Graph (0, 0)][DBLP] OSDI, 2006, pp:75-88 [Conf]
- Feng Zhou, Jeremy Condit, Zachary R. Anderson, Ilya Bagrak, Robert Ennals, Matthew Harren, George C. Necula, Eric A. Brewer
SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. [Citation Graph (0, 0)][DBLP] OSDI, 2006, pp:45-60 [Conf]
- Christopher Colby, Peter Lee, George C. Necula, Fred Blau, Mark Plesko, Kenneth Cline
A certifying compiler for Java. [Citation Graph (0, 0)][DBLP] PLDI, 2000, pp:95-107 [Conf]
- Jeremy Condit, Matthew Harren, Scott McPeak, George C. Necula, Westley Weimer
CCured in the real world. [Citation Graph (0, 0)][DBLP] PLDI, 2003, pp:232-244 [Conf]
- George C. Necula
Translation validation for an optimizing compiler. [Citation Graph (0, 0)][DBLP] PLDI, 2000, pp:83-94 [Conf]
- George C. Necula, Peter Lee
The Design and Implementation of a Certifying Compiler. [Citation Graph (0, 0)][DBLP] PLDI, 1998, pp:333-344 [Conf]
- George C. Necula, Peter Lee
The design and implementation of a certifying compiler (with retrospective) [Citation Graph (0, 0)][DBLP] Best of PLDI, 1998, pp:612-625 [Conf]
- Sumit Gulwani, George C. Necula
Discovering affine equalities using random interpretation. [Citation Graph (0, 0)][DBLP] POPL, 2003, pp:74-84 [Conf]
- Sumit Gulwani, George C. Necula
Global value numbering using random interpretation. [Citation Graph (0, 0)][DBLP] POPL, 2004, pp:342-352 [Conf]
- Sumit Gulwani, George C. Necula
Precise interprocedural analysis using random interpretation. [Citation Graph (0, 0)][DBLP] POPL, 2005, pp:324-337 [Conf]
- George C. Necula, Scott McPeak, Westley Weimer
CCured: type-safe retrofitting of legacy code. [Citation Graph (0, 0)][DBLP] POPL, 2002, pp:128-139 [Conf]
- George C. Necula, Shree Prakash Rahul
Oracle-based checking of untrusted software. [Citation Graph (0, 0)][DBLP] POPL, 2001, pp:142-154 [Conf]
- George C. Necula
Proof-carrying code: design, implementation and applications (abstract). [Citation Graph (0, 0)][DBLP] PPDP, 2000, pp:175-177 [Conf]
- Bor-Yuh Evan Chang, Matthew Harren, George C. Necula
Analysis of Low-Level Code Using Cooperating Decompilers. [Citation Graph (0, 0)][DBLP] SAS, 2006, pp:318-335 [Conf]
- Sumit Gulwani, George C. Necula
A Polynomial-Time Algorithm for Global Value Numbering. [Citation Graph (0, 0)][DBLP] SAS, 2004, pp:212-227 [Conf]
- Sumit Gulwani, George C. Necula
Path-Sensitive Analysis for Linear Arithmetic and Uninterpreted Functions. [Citation Graph (0, 0)][DBLP] SAS, 2004, pp:328-343 [Conf]
- Matthew Harren, George C. Necula
Using Dependent Types to Certify the Safety of Assembly Code. [Citation Graph (0, 0)][DBLP] SAS, 2005, pp:155-170 [Conf]
- J. Robert von Behren, Jeremy Condit, Feng Zhou, George C. Necula, Eric A. Brewer
Capriccio: scalable threads for internet services. [Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:268-281 [Conf]
- George C. Necula, Peter Lee
Research on Proof-Carrying Code for Untrusted-Code Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:204- [Conf]
- Westley Weimer, George C. Necula
Mining Temporal Specifications for Error Detection. [Citation Graph (0, 0)][DBLP] TACAS, 2005, pp:461-476 [Conf]
- Bor-Yuh Evan Chang, Adam J. Chlipala, George C. Necula, Robert R. Schneck
The open verifier framework for foundational verifiers. [Citation Graph (0, 0)][DBLP] TLDI, 2005, pp:1-12 [Conf]
- Bor-Yuh Evan Chang, Adam J. Chlipala, George C. Necula, Robert R. Schneck
Type-based verification of assembly language for compiler debugging. [Citation Graph (0, 0)][DBLP] TLDI, 2005, pp:91-102 [Conf]
- Bor-Yuh Evan Chang, Adam J. Chlipala, George C. Necula
A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety. [Citation Graph (0, 0)][DBLP] VMCAI, 2006, pp:174-189 [Conf]
- Jens Knoop, George C. Necula, Wolf Zimmermann
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:132, n:1, pp:1-3 [Journal]
- Jens Knoop, George C. Necula, Wolf Zimmermann
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:141, n:2, pp:1-3 [Journal]
- George C. Necula
Enforcing Security and Safety with Proof-Carrying Code. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
- Sumit Gulwani, George C. Necula
A randomized satisfiability procedure for arithmetic and uninterpreted function symbols. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2005, v:199, n:1-2, pp:107-131 [Journal]
- Sumit Gulwani, George C. Necula
A polynomial-time algorithm for global value numbering. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2007, v:64, n:1, pp:97-114 [Journal]
- George C. Necula, Jeremy Condit, Matthew Harren, Scott McPeak, Westley Weimer
CCured: type-safe retrofitting of legacy software. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2005, v:27, n:3, pp:477-526 [Journal]
- Jeremy Condit, Matthew Harren, Zachary R. Anderson, David Gay, George C. Necula
Dependent Types for Low-Level Programming. [Citation Graph (0, 0)][DBLP] ESOP, 2007, pp:520-535 [Conf]
- Bor-Yuh Evan Chang, Xavier Rival, George C. Necula
Shape Analysis with Structural Invariant Checkers. [Citation Graph (0, 0)][DBLP] SAS, 2007, pp:384-401 [Conf]
- Jens Knoop, George C. Necula, Wolf Zimmermann
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:176, n:3, pp:1-2 [Journal]
- Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula
Enforcing resource bounds via static verification of dynamic checks. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2007, v:29, n:5, pp:- [Journal]
Beyond Bug-Finding: Sound Program Analysis for Linux. [Citation Graph (, )][DBLP]
Search in 0.009secs, Finished in 0.011secs
|