2007 |
22 | EE | Aiwu Shi,
Gleb Naumovich:
Improving Data Integrity with a Java Mutability Analysis.
APSEC 2007: 135-142 |
21 | EE | Aiwu Shi,
Gleb Naumovich:
Field Escape Analysis for Data Confidentiality in Java Components.
APSEC 2007: 143-150 |
20 | | Aiwu Shi,
Gleb Naumovich:
SAFES: A Static Analysis for Field Security in Java Components.
SEKE 2007: 302-307 |
2006 |
19 | EE | Paolina Centonze,
Gleb Naumovich,
Stephen J. Fink,
Marco Pistoia:
Role-Based access control consistency validation.
ISSTA 2006: 121-132 |
2005 |
18 | EE | Aiwu Shi,
Gleb Naumovich:
Static Analysis for Computing Escapability and Mutability for Java Components.
SCAM 2005: 119-128 |
2004 |
17 | EE | Chris Kojouharov,
Aleksey Solodovnik,
Gleb Naumovich:
JTutor: an Eclipse plug-in suite for creation and replay of code-based tutorials.
ETX 2004: 27-31 |
16 | EE | Gleb Naumovich,
Paolina Centonze:
Static analysis of role-based access control in J2EE applications.
ACM SIGSOFT Software Engineering Notes 29(5): 1-10 (2004) |
15 | EE | Matthew B. Dwyer,
Lori A. Clarke,
Jamieson M. Cobleigh,
Gleb Naumovich:
Flow analysis for verifying properties of concurrent software systems.
ACM Trans. Softw. Eng. Methodol. 13(4): 359-430 (2004) |
2003 |
14 | EE | Mikhail Sosonkin,
Gleb Naumovich,
Nasir D. Memon:
Obfuscation of design intent in object-oriented applications.
Digital Rights Management Workshop 2003: 142-153 |
13 | | Vikram Anantapadmanabhan,
Phyllis G. Frankl,
Nasir D. Memon,
Gleb Naumovich:
Design of a Laboratory for Information Security Education.
World Conference on Information Security Education 2003: 61-73 |
12 | EE | Gleb Naumovich,
Nasir D. Memon:
Preventing Piracy, Reverse Engineering, and Tampering.
IEEE Computer 36(7): 64-71 (2003) |
2002 |
11 | EE | Gleb Naumovich:
A conservative algorithm for computing the flow of permissions in Java programs.
ISSTA 2002: 33-43 |
10 | EE | Gleb Naumovich:
Using the observer design pattern for implementation of data flow analyses.
PASTE 2002: 61-68 |
2000 |
9 | EE | Gleb Naumovich,
Lori A. Clarke:
Classifying properties: an alternative to the safety-liveness classification.
SIGSOFT FSE 2000: 159-168 |
1999 |
8 | EE | Gleb Naumovich,
George S. Avrunin,
Lori A. Clarke:
An Efficient Algorithm for Computing MHP Information for Concurrent Java Programs.
ESEC / SIGSOFT FSE 1999: 338-354 |
7 | EE | Gleb Naumovich,
George S. Avrunin,
Lori A. Clarke:
Data Flow Analysis for Checking Properties of Concurrent Java Programs.
ICSE 1999: 399-410 |
6 | EE | Gleb Naumovich,
Lori A. Clarke,
Jamieson M. Cobleigh:
Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification.
PASTE 1999: 57-65 |
1998 |
5 | EE | Gleb Naumovich,
Lori A. Clarke,
Leon J. Osterweil:
Efficient Composite Data Flow Analysis Applied to Concurrent Programs.
PASTE 1998: 51-58 |
4 | EE | Gleb Naumovich,
George S. Avrunin:
A Conservative Data Flow Algorithm for Detecting All Pairs of Statement That May Happen in Parallel.
SIGSOFT FSE 1998: 24-34 |
1997 |
3 | EE | Gleb Naumovich,
George S. Avrunin,
Lori A. Clarke,
Leon J. Osterweil:
Applying Static Analysis to Software Architectures.
ESEC / SIGSOFT FSE 1997: 77-93 |
2 | EE | Gleb Naumovich,
Lori A. Clarke,
Leon J. Osterweil,
Matthew B. Dwyer:
Verification of Concurrent Software with FLAVERS.
ICSE 1997: 594-595 |
1996 |
1 | EE | Gleb Naumovich,
Lori A. Clarke,
Leon J. Osterweil:
Verification of Communication Protocols Using Data Flow Analysis.
SIGSOFT FSE 1996: 93-105 |