Travelled to:
1 × Australia
1 × China
1 × Germany
1 × Hungary
1 × Sweden
1 × Switzerland
2 × Italy
9 × USA
Collaborated with:
∅ M.V.Emmerik L.Li N.Keynes D.Simon A.Fraboulet B.Scholz J.Tröger D.Ung S.Sendall A.Fitzgerald V.M.Malhotra C.Zhang T.Waddington N.Ramsey N.Hawes M.Valdiviezo A.Browne J.Zimmermann A.Craik D.Teoh C.Hoermann
Talks about:
binari (10) analysi (7) code (6) translat (4) recoveri (3) parfait (3) static (3) graph (3) engin (3) flow (3)
♀ Person: Cristina Cifuentes
DBLP: Cifuentes:Cristina
Facilitated 1 volumes:
Contributed to:
Wrote 22 papers:
- ISMM-2013-LiCK #analysis #graph #pointer #precise #scalability
- Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
- ESEC-FSE-2011-CifuentesKLHVBZCTH #fault #scalability #using
- Static deep error checking in large system applications using parfait (CC, NK, LL, NH, MV, AB, JZ, AC, DT, CH), pp. 432–435.
- ESEC-FSE-2011-LiCK #analysis #performance #points-to #using
- Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
- FSE-2010-LiCK #analysis #detection #effectiveness
- Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
- PEPM-2009-CifuentesKLS #debugging #detection #program analysis #using
- Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
- SCAM-2008-Cifuentes #c #debugging #named #scalability
- Parfait — A Scalable Bug Checker for C Code (CC), pp. 263–264.
- SCAM-2008-ScholzZC #analysis #dependence #graph #reachability
- User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
- WCRE-2002-TrogerC #analysis
- Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
- WCRE-2001-CifuentesWE #analysis #debugging #decompiler #security
- Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
- CSMR-2000-CifuentesS #abstraction
- Procedure Abstraction Recovery from Binary Code (CC, DS), pp. 55–64.
- WCRE-2000-UngC #re-engineering #runtime
- Dynamic Re-engineering of Binary Code with Run-time Feedbacks (DU, CC), pp. 2–10.
- IWPC-1999-CifuentesE
- Recovery of Jump Table Case Statements from Binary Code (CC, MVE), pp. 192–199.
- IWPC-J-1999-CifuentesE01
- Recovery of jump table case statements from binary code (CC, MVE), pp. 171–188.
- WCRE-1999-Cifuentes #development #reverse engineering
- The Impact of Copyright on the Development of Cutting Edge Binary Reverse Engineering Technology (CC), pp. 66–76.
- WCRE-1999-CifuentesER #design
- The Design of a Resourceable and Retargetable Binary Translator (CC, MVE, NR), pp. 280–291.
- ICSM-1998-CifuentesSF #assembly
- Assembly to High-Level Language Translation (CC, DS, AF), pp. 228–237.
- IWPC-1998-CifuentesS #bytecode #semantics #specification
- Specifying the Semantics of Machine Instructions (CC, SS), pp. 126–133.
- ICSE-1997-CifuentesF #distributed #internet
- Copyright in Shareware Software Distributed on the Internet — The Trumpet Winsock Case (CC, AF), pp. 456–464.
- ICSM-1997-CifuentesF #bytecode #slicing
- Intraprocedural Static Slicing of Binary Executables (CC, AF), p. 188–?.
- CC-1996-Cifuentes #graph
- Structuring Decompiled Graphs (CC), pp. 91–105.
- ICSM-1996-CifuentesM #question
- Binary Translation: Static, Dynamic, Retargetable? (CC, VMM), pp. 340–349.
- WCRE-1996-Cifuentes #automation #reverse engineering
- Partial Automation of an Integrated Reverse Engineering Environment of Binary Code (CC), pp. 50–56.