BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Australia
1 × China
1 × Germany
1 × Hungary
1 × Sweden
1 × Switzerland
2 × Italy
9 × USA
Collaborated with:
M.V.Emmerik L.Li N.Keynes D.Simon A.Fraboulet B.Scholz J.Tröger D.Ung S.Sendall A.Fitzgerald V.M.Malhotra C.Zhang T.Waddington N.Ramsey N.Hawes M.Valdiviezo A.Browne J.Zimmermann A.Craik D.Teoh C.Hoermann
Talks about:
binari (10) analysi (7) code (6) translat (4) recoveri (3) parfait (3) static (3) graph (3) engin (3) flow (3)

♀ Person: Cristina Cifuentes

DBLP DBLP: Cifuentes:Cristina

Facilitated 1 volumes:

WCRE 2000GCh

Contributed to:

ISMM 20132013
ESEC/FSE 20112011
FSE 20102010
PEPM 20092009
SCAM 20082008
WCRE 20022002
WCRE 20012001
CSMR 20002000
WCRE 20002000
IWPC 19991999
IWPC 19992001
WCRE 19991999
ICSM 19981998
IWPC 19981998
ICSE 19971997
ICSM 19971997
CC 19961996
ICSM 19961996
WCRE 19961996

Wrote 22 papers:

ISMM-2013-LiCK #analysis #graph #pointer #precise #scalability
Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
ESEC-FSE-2011-CifuentesKLHVBZCTH #fault #scalability #using
Static deep error checking in large system applications using parfait (CC, NK, LL, NH, MV, AB, JZ, AC, DT, CH), pp. 432–435.
ESEC-FSE-2011-LiCK #analysis #performance #points-to #using
Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
FSE-2010-LiCK #analysis #detection #effectiveness
Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
PEPM-2009-CifuentesKLS #debugging #detection #program analysis #using
Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
SCAM-2008-Cifuentes #c #debugging #named #scalability
Parfait — A Scalable Bug Checker for C Code (CC), pp. 263–264.
SCAM-2008-ScholzZC #analysis #dependence #graph #reachability
User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
WCRE-2002-TrogerC #analysis
Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
WCRE-2001-CifuentesWE #analysis #debugging #decompiler #security
Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
CSMR-2000-CifuentesS #abstraction
Procedure Abstraction Recovery from Binary Code (CC, DS), pp. 55–64.
WCRE-2000-UngC #re-engineering #runtime
Dynamic Re-engineering of Binary Code with Run-time Feedbacks (DU, CC), pp. 2–10.
Recovery of Jump Table Case Statements from Binary Code (CC, MVE), pp. 192–199.
Recovery of jump table case statements from binary code (CC, MVE), pp. 171–188.
WCRE-1999-Cifuentes #development #reverse engineering
The Impact of Copyright on the Development of Cutting Edge Binary Reverse Engineering Technology (CC), pp. 66–76.
WCRE-1999-CifuentesER #design
The Design of a Resourceable and Retargetable Binary Translator (CC, MVE, NR), pp. 280–291.
ICSM-1998-CifuentesSF #assembly
Assembly to High-Level Language Translation (CC, DS, AF), pp. 228–237.
IWPC-1998-CifuentesS #bytecode #semantics #specification
Specifying the Semantics of Machine Instructions (CC, SS), pp. 126–133.
ICSE-1997-CifuentesF #distributed #internet
Copyright in Shareware Software Distributed on the Internet — The Trumpet Winsock Case (CC, AF), pp. 456–464.
ICSM-1997-CifuentesF #bytecode #slicing
Intraprocedural Static Slicing of Binary Executables (CC, AF), p. 188–?.
CC-1996-Cifuentes #graph
Structuring Decompiled Graphs (CC), pp. 91–105.
ICSM-1996-CifuentesM #question
Binary Translation: Static, Dynamic, Retargetable? (CC, VMM), pp. 340–349.
WCRE-1996-Cifuentes #automation #reverse engineering
Partial Automation of an Integrated Reverse Engineering Environment of Binary Code (CC), pp. 50–56.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.