Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Mastroeni, Isabella
2013.
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications.
Electronic Proceedings in Theoretical Computer Science,
Vol. 129,
Issue. ,
p.
41.
Chudnov, Andrey
Kuan, George
and
Naumann, David A.
2014.
Information Flow Monitoring as Abstract Interpretation for Relational Logic.
p.
48.
Preda, Mila Dalla
Mastroeni, Isabella
and
Giacobazzi, Roberto
2014.
Analyzing program dependencies for malware detection.
p.
1.
Johnson, Andrew
Waye, Lucas
Moore, Scott
and
Chong, Stephen
2015.
Exploring and enforcing security guarantees via program dependence graphs.
ACM SIGPLAN Notices,
Vol. 50,
Issue. 6,
p.
291.
Johnson, Andrew
Waye, Lucas
Moore, Scott
and
Chong, Stephen
2015.
Exploring and enforcing security guarantees via program dependence graphs.
p.
291.
Yamaguchi, Fabian
Maier, Alwin
Gascon, Hugo
and
Rieck, Konrad
2015.
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.
p.
797.
Assaf, Mounir
Naumann, David A.
Signoles, Julien
Totel, Éric
and
Tronel, Frédéric
2017.
Hypercollecting semantics and its application to static analysis of information flow.
ACM SIGPLAN Notices,
Vol. 52,
Issue. 1,
p.
874.
Assaf, Mounir
Naumann, David A.
Signoles, Julien
Totel, Éric
and
Tronel, Frédéric
2017.
Hypercollecting semantics and its application to static analysis of information flow.
p.
874.
Buro, Samuele
and
Mastroeni, Isabella
2018.
Verification, Model Checking, and Abstract Interpretation.
Vol. 10747,
Issue. ,
p.
116.
Giacobazzi, Roberto
and
Mastroeni, Isabella
2018.
Abstract Non-Interference.
ACM Transactions on Privacy and Security,
Vol. 21,
Issue. 2,
p.
1.
Bruni, Roberto
Giacobazzi, Roberto
Gori, Roberta
and
Ranzato, Francesco
2023.
Challenges of Software Verification.
Vol. 238,
Issue. ,
p.
145.