Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
34
views
7
references
Top references
cited by
17
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,958
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Aided Verification
SLAyer: Memory Safety for Systems-Level Code
other
Author(s):
Josh Berdine
,
Byron Cook
,
Samin Ishtiaq
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Embodied Memory
Most cited references
7
Record
: found
Abstract
: not found
Book Chapter
: not found
A Local Shape Analysis Based on Separation Logic
Dino Distefano
,
Peter O’Hearn
,
Hongseok Yang
(2006)
0
comments
Cited
44
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Symbolic Execution with Separation Logic
Josh Berdine
,
Cristiano Calcagno
,
Peter O’Hearn
(2005)
0
comments
Cited
42
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Scalable Shape Analysis for Systems Code
Hongseok Yang
,
Oukseh Lee
,
Josh Berdine
…
(2008)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 178-183
DOI:
10.1007/978-3-642-22110-1_15
SO-VID:
cfd018ef-6c39-4ec3-b575-3d8cc74b6ecc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
pp. 470
HMC: Verifying Functional Programs Using Abstract Interpreters
pp. 50
Stability in Weak Memory Models
pp. 99
Getting Rid of Store-Buffers in TSO Analysis
pp. 149
Resolution Proofs and Skolem Functions in QBF Evaluation and Applications
pp. 165
The BINCOA Framework for Binary Code Analysis
pp. 171
CVC4
pp. 178
SLAyer: Memory Safety for Systems-Level Code
pp. 184
CPAchecker: A Tool for Configurable Software Verification
pp. 225
Model Checking Algorithms for CTMDPs
pp. 243
Quantitative Synthesis for Concurrent Programs
pp. 277
Smoothing a Program Soundly and Robustly
pp. 349
Time for Statistical Model Checking of Real-Time Systems
pp. 372
Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic
pp. 379
SpaceEx: Scalable Verification of Hybrid Systems
pp. 396
From Cardiac Cells to Genetic Regulatory Networks
pp. 412
Threader: A Constraint-Based Verifier for Multi-threaded Programs
pp. 457
μZ– An Efficient Engine for Fixed Points with Constraints
pp. 463
BAP: A Binary Analysis Platform
pp. 504
Bug-Assist: Assisting Fault Localization in ANSI-C Programs
pp. 526
Language Equivalence for Probabilistic Automata
pp. 573
Interpolation-Based Software Verification with Wolverine
pp. 585
PRISM 4.0: Verification of Probabilistic Real-Time Systems
pp. 592
Program Analysis for Overlaid Data Structures
pp. 609
KLOVER: A Symbolic Execution and Automatic Test Generation Tool for C++ Programs
pp. 663
Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP
pp. 669
Practical, Low-Effort Equivalence Verification of Real Code
pp. 686
Relational Abstractions for Continuous and Hybrid Systems
pp. 703
Simplifying Loop Invariant Generation Using Splitter Predicates
pp. 743
Model Checking Recursive Programs with Numeric Data Types
Similar content
2,958
Cult telefantasy series: A critical analysis of The Prisoner, Twin Peaks, the X-Files, Buffy the Vampire Slayer, Lost, Heroes, Doctor Who and Star Trek. Jefferson
Authors:
S. Short
Buffy in the classroom: Essays on teaching with the vampire slayer
Authors:
KD Koontz
Tobacco" - the silent slayer for oral premalignant lesions/conditions among Beedi rolling workers of Durg city, Chhattisgarh, India: A cross-sectional study
Authors:
G. Yunus
,
H. Sahni
,
N Naveen
See all similar
Cited by
17
Automating Separation Logic Using SMT
Authors:
Ruzica Piskac
,
Thomas Wies
,
Damien Zufferey
Automating Separation Logic with Trees and Data
Authors:
Ruzica Piskac
,
Thomas Wies
,
Damien Zufferey
Foundations for Decision Problems in Separation Logic with General Inductive Predicates
Authors:
Timos Antonopoulos
,
Nikos Gorogiannis
,
Christoph Haase
…
See all cited by