Skip to content
Raffi Khatchadourian edited this page Oct 3, 2017 · 2 revisions

Partial list of publications that rely on the WALA infrastructure (including Shrike), or its precursor DOMO. This list is not fully up-to-date; you can find more publications based on WALA using this Google Scholar search.

2011

  1. Chang, J. et al. ToMaTo: A Trustworthy Code Mashup Development Tool. Mashups 2011. September 14, 2011, Lugano, Switzerland.

  2. Salvatore Guarnieri, Marco Pistoia, Omer Tripp, Julian Dolby, Stephen Teilhet, and Ryan Berg. 2011. Saving the world wide web from vulnerable JavaScript. In Proceedings of the 2011 International Symposium on Software Testing and Analysis (ISSTA '11).

  3. Yinxing Xue, Zhenchang Xing, and Stan Jarzabek. 2011. CloneDiff: semantic differencing of clones. In Proceedings of the 5th International Workshop on Software Clones (IWSC '11). ACM, New York, NY, USA, 83-84.

  4. Yunhui Zheng, Tao Bao, and Xiangyu Zhang. 2011. Statically locating web application bugs caused by asynchronous calls. In Proceedings of the 20th international conference on World wide web (WWW '11). ACM, New York, NY, USA

  5. Path- and Index-sensitive String Analysis based on Monadic Second-order Logic, Takaaki Tateishi, Marco Pistoia, and Omer Tripp, ISSTA 2011

  6. Ravichandhran Madhavan and Raghavan Komondoor. 2011. Null dereference verification via over-approximated weakest pre-conditions analysis. In Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications (OOPSLA '11).

  7. Refactoring Java programs for flexible locking , Schafer, M.; Sridharan, M.; Dolby, J.; Tip, F., Software Engineering (ICSE), 2011 33rd International Conference on

  8. Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs, Summer, Hammer, and Dolby, Proceedings of the 2nd International Conference on Runtime Verification (RV’11).

  9. Keshmesh: A Tool for Detecting and Fixing Java Concurrency Bug Patterns, Vakilian, Mohsen; Negara, Stas; Tasharofi, Samira; Johnson, Ralph E., SPLASH’11 Companion, 2011, Portland, Oregon, USA.

  10. Refactoring for Immutability. Fredrik Kjolstad, Danny Dig, Gabriel Acevedo and Marc Snir. In ICSE 2011.

  11. Refactoring Java Programs using Concurrent Libraries. Kazuaki Ishizaki, Shahrokh Daijavad, and Toshio Nakatani. In PADTAD 2011.

2010

  1. Zhi Da Luo, Linda Hillis, Raja Das, and Yao Qi. 2010. Effective Static Analysis to Find Concurrency Bugs in Java. In Proceedings of the 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation (SCAM '10).

  2. Has the bug really been fixed? , Zhongxian Gu; Barr, E.T.; Hamilton, D.J.; Zhendong Su, Software Engineering, 2010 ACM/IEEE 32nd International Conference on

  3. Speeding Up Context-, Object- and Field-Sensitive SDG Generation, Graf, J., Source Code Analysis and Manipulation (SCAM), 2010 10th IEEE Working Conference on

  4. Mining subclassing directives to improve framework reuse, Bruch, M.; Mezini, M.; Monperrus, M, Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on

  5. Detecting Missing Method Calls in Object-Oriented Software , Martin Monperrus, Marcel Bruch and Mira Mezini, ECOOP 2010 – Object-Oriented Programming.

  6. Debugging Model-Transformation Failures Using Dynamic Tainting. Pankaj Dhoolia, Senthil Mani, Vibha Singhal Sinha, and Saurabh Sinha. ECOOP 2010.

  7. Correct Refactoring of Concurrent Java Code. Max Schäfer, Julian Dolby, Manu Sridharan, Emina Torlak, and Frank Tip, ECOOP 2010.

  8. MemSAT: checking axiomatic specifications of memory models. Emina Torlak, Mandana Vaziri, Julian Dolby, PLDI 2010.

2009

  1. Marcel Bruch, Martin Monperrus, and Mira Mezini. 2009. Learning from examples to improve code completion systems. In Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC/FSE '09). ACM, New York, NY, USA, 213-222.

  2. Markus Weimer, Alexandros Karatzoglou, and Marcel Bruch. 2009. Maximum margin matrix factorization for code recommendation. In Proceedings of the third ACM conference on Recommender systems (RecSys '09). ACM, New York, NY, USA, 309-312.

  3. Danny Dig, Mihai Tarce, Cosmin Radoi, Marius Minea, and Ralph Johnson. 2009. Relooper: refactoring for loop parallelism in Java. In Proceeding of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (OOPSLA '09). ACM, New York, NY, USA, 793-794.

  4. Accurate Interprocedural Null-Dereference Analysis for Java. Nanda, M. G. and Sinha, S. In Proceedings of the 2009 IEEE 31st international Conference on Software Engineering (May 16 - 24, 2009). International Conference on Software Engineering. IEEE Computer Society, Washington, DC, 133-143.

  5. JUnitMX - A change-aware unit testing tool. Jan Wloka, Barbara G. Ryder, Frank Tip, ICSE pp.567-570, 2009 IEEE 31st International Conference on Software Engineering, 2009

  6. Fault localization and repair for Java runtime exceptions. Sinha, S., Shah, H., Görg, C., Jiang, S., Kim, M., and Harrold, M. In Proceedings of the Eighteenth international Symposium on Software Testing and Analysis (Chicago, IL, USA, July 19 - 23, 2009). ISSTA '09. ACM, New York, NY, 153-164.

  7. Automated Analysis of Java Methods for Confidentiality. Pavol Cerny and Rajeev Alur. In 21st International Conference on Computer Aided Verification (CAV), 2009.

  8. Refactoring for Reentrancy. Jan Wloka, Manu Sridharan, and Frank Tip. In Seventh Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2009).

  9. The Complexity of Andersen's Analysis in Practice, Manu Sridharan and Stephen J. Fink. To appear in The 16th International Static Analysis Symposium (SAS 2009).

  10. Snugglebug: A Powerful Approach to Weakest Preconditions. Satish Chandra, Stephen Fink, and Manu Sridharan. In Proceedings of Programming Languages Design and Implementation (PLDI 2009), Dublin, Ireland, June 2009.

  11. TAJ: Effective Taint Analysis of Web Applications, Omer Tripp, Marco Pistoia, Stephen Fink, Manu Sridharan, Omri Weisman. In Proceedings of Programming Languages Design and Implementation (PLDI 2009), Dublin, Ireland, June 2009.

  12. Safe-Commit Analysis to Facilitate Team Software Development, Jan Wloka, Barbara G. Ryder, Frank Tip and Xiaoxia Ren. To Appear in Proceedings of International Conference on Software Engineering (ICSE 2009), Vancouver, Canada, May 2009.

  13. Modular String-Sensitive Permission Analysis with Demand-Driven Precision, Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Barbara Ryder, Julian Dolby. In Proceedings of International Conference on Software Engineering (ICSE 2009), Vancouver, BC, Canada, May 2009.

  14. Compile-Time Analysis and Specialization of Clocks in Concurrent Programs, Nalini Vasudevan, Olivier Tardieu, Julian Dolby, Stephen A. Edwards, International Conference on Compiler Construction (CC 09), 22-29 March 2009, York, United Kingdom

  15. Finding Concurrency-Related Bugs Using Random Isolation, Nicholas Kidd, Thomas W. Reps, Julian Dolby, Mandana Vaziri, In Verification, Model Checking, and Abstract Interpretation, 10th International Conference (VMCAI 2009), Savannah, GA, USA, January 18-20, 2009.

2008

  1. Verifying Dereference Safety via Expanding-Scope Analysis, Alexey Loginov, Eran Yahav, Satish Chandra, Stephen Fink, Noam Rinetzky, Mangala Gowri, In Proceedings of the ACM SIGSOFT 2008 International Symposium on Software Testing and Analysis (ISSTA 2008)

  2. A Scalable Technique for Characterizing the Usage of Temporaries in Framework-intensive Java Applications, Bruno Dufour, Barbara G. Ryder, Gary Sevitsky, Foundations of Software Engineering (FSE), Atlanta, GA, USA, 2008.

  3. Effective Blame for Information-Flow Violations, Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia, Foundations of Software Engineering (FSE), Atlanta, GA, USA, 2008.

  4. Type inference for locality analysis of distributed data structures, Satish Chandra, Vijay Saraswat, Vivek Sarkar, Ras Bodik, Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, 2008.

  5. Static Specification Mining Using Automata-Based Abstractions, Sharon Shoham, Eran Yahav, Stephen Fink, and Marco Pistoia, IEEE Transactions on Software Engineering,Volume 34, Issue 5 (September 2008),Pages 651-666.

  6. Effective Typestate Verification in the Presence of Aliasing, Stephen Fink, Eran Yahav, G. Ramalingam, Nurit Dor, and Emmanuel Geay, ACM Transactions on Software Engineering and Metholodgy, Volume 17,Issue 2,2008.

  7. The CLOSER: automating resource management in Java, Isil Dillig, Thomas Dillig, Eran Yahav, Satish Chandra, Proceedings of the 7th international symposium on Memory management, 2008.

  8. Generating Precise and Concise Procedure Summaries, Greta Yorsh, Eran Yahav, and Satish Chandra. Accepted to ACM Symposium on Principles of Programming Languages, (POPL 2008)

  9. ReBA: Refactoring-aware Binary Adaptation of Evolving Libraries, Danny Dig, Stas Negara, Vibhu Mohindra, Ralph Johnson, Proceedings of International Conference on Software Engineering (ICSE'08), Leipzig - May 2008.

  10. Dynamic detection of atomic-set-serializability violations, Christian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip, Proceedings of International Conference on Software Engineering (ICSE'08), Leipzig - May 2008.

2007

  1. Reducing Unnecessary Conservativeness in Access Rights Analysis with String Analysis.Koganeyama, M., Tabuchi, N., and Tateishi, T. 2007. In Proceedings of the 14th Asia-Pacific Software Engineering Conference (December 04 - 07, 2007). APSEC.

  2. Filtering out methods you wish you hadn't navigated.Ying, A. T. and Tarr, P. L. 2007. In Proceedings of the 2007 OOPSLA Workshop on Eclipse Technology Exchange (Montreal, Quebec, Canada, October 21 - 21, 2007). eclipse '07.

  3. Static Specification Mining Using Automata-Based Abstractions.Sharon Shoham, Eran Yahav, Stephen J. Fink, and Marco Pistoia. In Proceedings of the ACM SIGSOFT 2007 International Symposium on Software Testing and Analysis (ISSTA 2007), London, United Kingdom, July 2007. ACM Press.

  4. Blended Analysis for Performance Understanding in Framework-Based Systems. Bruno Dufour, Barbara Ryder, Gary Sevitsky. International Symposium on Software Testing and Analysis (ISSTA), London, UK, 2007

  5. Finding Bugs Efficiently with a SAT Solver, Julian Dolby, Mandana Vaziri, and Frank Tip, in Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2007)

  6. Thin Slicing. Manu Sridharan, Stephen J. Fink, and Rastislav Bodik. In Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI 2007), San Diego, CA, June 2007.

  7. When Role Models Have Flaws: Static Validation of Enterprise Security Policies. Marco Pistoia, Stephen J. Fink, Robert J. Flynn, and Eran Yahav. In Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, May 2007.

  8. A Survey of Static Analysis Methods for Identifying Security Vulnerabilities in Software Systems. Marco Pistoia, Satish Chandra, Stephen Fink, and Eran Yahav. IBM Systems Journal, volume 46, number 2, Armonk, NY, USA, May 2007. International Business Machines Corporation.

  9. Mashup Component Isolation via server-side analysis and instrumentation. K. Vikram and Michael Steiner. In Web 2.0 Security & Privacy Workshop. IEEE Computer Society, Technical Committee on Security and Privacy, 2007

2006

  1. Effective Typestate Verification in the Presence of Aliasing, Stephen Fink, Eran Yahav, Nurit Dor, Ramalingam, and Emmanuel Geay. In Proceedings of the ACM SIGSOFT 2006 International Symposium on Software Testing and Analysis (ISSTA 2006), Portland, ME, USA, July 2006. ACM Press.

  2. Role-Based Access Control Consistency Validation, Paolina Centonze, Gleb Naumovich, Stephen Fink, and Marco Pistoia. In Proceedings of the ACM SIGSOFT 2006 International Symposium on Software Testing and Analysis (ISSTA 2006), Portland, ME, USA, July 2006. ACM Press.

  3. The Case for Analysis Preserving Language Transformation Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, and Liangzhao Zeng. In Proceedings of the ACM SIGSOFT 2006 International Symposium on Software Testing and Analysis (ISSTA 2006), Portland, ME, USA, July 2006. ACM Press.

  4. Associating Synchronization Constraints with Data in an Object-Oriented Language Mandana Vaziri, Frank Tip, and Julian Dolby. In Proceedings of the Thirty-Third Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '06), (Charleston, SC, January 2006).

  5. Scalable and Flexible Error Detection, Emmanuel Geay, Eran Yahav, and Stephen Fink. PEPM 06 tools track, January 2006.

2005

  1. Deriving Object Typestates in the Presence of Inter-Object References. Mangala Gowri Nanda, Christian Grothoff and Satish Chandra. In Proceedings of the 19th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2005), October 2005.

  2. Relational queries over program traces, Simon Goldsmith, Robert O'Callahan, Alexander Aiken, OOPSLA 2005

  3. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection Marco Pistoia, Robert J. Flynn, Larry Koved, and Vugranam C. Sreedhar. In Proceedings of the 19th European Conference on Object-Oriented Programming (ECOOP 2005), pages 362-386, Glasgow, Scotland, UK, July 2005. Springer-Verlag.

  4. Static Analysis for J2EE Role-Based Access Control Policy Validation Paolina Centonze. Master of Science degree thesis. Polytechnic University, Brooklyn, NY, May 2005.

2004

  1. Semi-Automatic J2EE Transaction Configuration, S. Fink, J. Dolby, and L. Colby, IBM Research Report RC23326, 2004.

2003

  1. Object Equality Profiling, Darko Marinov, Robert O'Callahan, OOPSLA 2003

  2. Hybrid dynamic data race detection, Robert O'Callahan, Jong-Deok Choi, PPOPP 2003

Clone this wiki locally