Year |
Citation |
Score |
2014 |
Porter DE, Bond MD, Roy I, McKinley KS, Witchel E. Practical fine-grained information flow control using laminar Acm Transactions On Programming Languages and Systems. 37. DOI: 10.1145/2638548 |
0.618 |
|
2013 |
Bond MD, Kulkarni M, Cao M, Zhang M, Salmi MF, Biswas S, Sengupta A, Huang J. OCTET: Capturing and controlling cross-thread dependences efficiently Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 693-712. DOI: 10.1145/2509136.2509519 |
0.347 |
|
2013 |
Huang J, Bond MD. Efficient context sensitivity for dynamic analyses via calling context uptrees and customized memory management? Acm Sigplan Notices. 48: 53-71. DOI: 10.1145/2509136.2509510 |
0.316 |
|
2011 |
Srivastava V, Bond MD, McKinley KS, Shmatikov V. A security policy oracle: Detecting security holes using multiple API implementations Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 343-354. DOI: 10.1145/1993498.1993539 |
0.528 |
|
2011 |
Xu G, Bond MD, Qin F, Rountev A. LeakChaser: Helping programmers narrow down causes of memory leaks Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 270-282. DOI: 10.1145/1993498.1993530 |
0.368 |
|
2010 |
Bond MD, Srivastava V, McKinley KS, Shmatikov V. Efficient, context-sensitive detection of real-world semantic attacks Proceedings of the Acm Sigplan 5th Workshop On Programming Languages and Analysis For Security, Plas 2010. DOI: 10.1145/1814217.1814218 |
0.596 |
|
2010 |
Bond MD, Baker GZ, Guyer SZ. Breadcrumbs: Efficient context sensitivity for dynamic bug detection analyses Acm Sigplan Notices. 45: 13-24. DOI: 10.1145/1809028.1806599 |
0.371 |
|
2010 |
Bond MD, Coons KE, McKinley KS. Pacer: Proportional detection of data races Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 255-268. DOI: 10.1145/1806596.1806626 |
0.466 |
|
2009 |
Roy I, Porter DE, Bond MD, McKinley KS, Witchel E. Laminar: Practical fine-grained decentralized information flow control Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 63-74. DOI: 10.1145/1542476.1542484 |
0.609 |
|
2009 |
Bond MD, McKinley KS. Leak Pruning Acm Sigplan Notices. 44: 277-288. DOI: 10.1145/1508244.1508277 |
0.588 |
|
2008 |
Bond MD, McKinley KS. Tolerating Memory Leaks Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 109-125. DOI: 10.1145/1449764.1449774 |
0.584 |
|
2007 |
Bond MD, Nethercote N, Kent SW, Guyer SZ, McKinley KS. Tracking bad apples: Reporting the origin of null and undefined value errors Acm Sigplan Notices. 42: 405-422. DOI: 10.1145/1297027.1297057 |
0.547 |
|
2007 |
Bond MD, McKinley KS. Probabilistic calling context Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 97-111. DOI: 10.1145/1297027.1297035 |
0.599 |
|
2007 |
Lee B, Resnick K, Bond MD, McKinley KS. Correcting the dynamic call graph using control-flow constraints Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4420: 80-95. |
0.555 |
|
2006 |
Bond MD, McKinley KS. Bell: Bit-encoding online memory leak detection Acm Sigplan Notices. 41: 61-72. DOI: 10.1145/1168857.1168866 |
0.538 |
|
2005 |
Bond MD, McKinley KS. Continuous path and edge profiling Proceedings of the Annual International Symposium On Microarchitecture, Micro. 130-140. DOI: 10.1109/MICRO.2005.16 |
0.528 |
|
2005 |
Bond MD, McKinley KS. Practical path profiling for dynamic optimizers Proceedings of the 2005 International Symposium On Code Generation and Optimization, Cgo 2005. 2005: 205-216. DOI: 10.1109/CGO.2005.28 |
0.522 |
|
Show low-probability matches. |